Computer
Computer Knowledge
Questions
1. RAM stands for :
(A) Read Access Memory
(B) Random Access Memory
(C) Random Assigned Memory
(D) All of these
(E) None of these
2. Data in RAM are :
(A) Volatile in nature
(B) Non-volatile in nature
(C) Both (A) & (B)
(D) All of these
(E) None of these
3. BIOS stands for :
(A) Basic Input Output System
(B) Basic Instruction Output System
(C) Basic Interface Output System
(D) All of these
(E) None of these
4. RAM in its commercial forms are available as :
(A) SIMM
(B) DIMM
(C) Both (A) & (B)
(D) CPSB
(E) None of these
5. Which of the following requires refreshing during retaining the data?
(A) DRAM
(B) SRAM
(C) Virtual Memory
(D) FDD
(E) None of these
6. Refresh Rate of monitor is measured in :
(A) Hz
(B) Meter
(C) Volts
(D) Amp.
(E) None of these
7. Which of the following meaning is used between CPU & RAM to speed up
the processing power of a CPU?
(A) Virtual Memory
(B) DRAM
(C) Flash Memory
(D) Cache Memory
(E) None of these
8. Which of the following is lowest in memory hierarchy?
(A) Cache memory
(B) Secondary memory
(C) Registers
(D) RAM
(E) None of these
9. Which of the following is an input device?
(A) Keyboard
(B) VDU
(C) Both (A) & (B)
(D) Dvu
(E) None of these
10. CRT stands for :
(A) Character Ray Tube
(B) Cathode Ray Tube
(C) Colour Ray Tube
(D) All of the above
(E) None of these
11. Which of the following is a GUI device :
(A) Keyboard
(B) Mouse
(C) OMR
(D) All of these
(E) None of these
12. LCD stands for :
(A) Liquid Crystal Display
(B) Laser Crystal Display
(C) Light Crystal Display
(D) All of these
(E) None of these
13. Such types of printers, in which the printing head contacts with the
paper in printing process, are called as :
(A) Impact Printer
(B) Non-Impact Printer
(C) Laser Printer
(D) All of these
(E) None of these
14. Which of the following is a type of optical media?
(A) FDD
(B) HDD
(C) CD
(D) Magnetic Tape
(E) None of these
15. DVD stands for :
(A) Digital Video Disk
(B) Digital Versatile Disk
(C) Both (A) & (B)
(D) All of these
(E) None of these
16. Which of the following is an input device?
(A) VDU
(B) Printer
(C) Plotter
(D) MICR
(E) None of these
17. Identify the odd one :
(A) Storage tape memory
(B) Magnetic disc memory
(C) Optical disc memory
(D) Read only memory
(E) None of these
18. Nibble describes a bits combination of :
(A) 5 bits
(B) 6 bits
(C) 7 bits
(D) 4 bits
(E) None of these
19. A Byte constitutes of :
(A) 9 bits
(B) 8 bits
(C) 7 bits
(D) 4 bits
(E) None of these
20. Memory in a PC is addressable through :
(A) Bits
(B) Byte
(C) Nibble
(D) All of these
(E) None of these
21. One Kilo Byte represents :
(A) 1024 bytes
(B) 1000 bytes
(C) 100 bytes
(D) 1064 bytes
(E) None of these
22. Basic building block for a digital circuit is :
(A) Word
(B) Logic Gate
(C) Processor
(D) BUS
(E) None of these
23. Which of the following is a logic gate?
(A) AND
(B) OR
(C) CPU
(D) Both (A) & (B)
(E) None of these
24. The base of binary number is :
(A) 2
(B) 16
(C) 8
(D) 10
(E) None of these
25. ASCII stands for :
(A) American Standard Code for Institute Interchange
(B) American Standard Code for Information Interchange
(C) American Standard Code for Information Institute
(D) All of these
(E) None of these
Answers :
1. (B) 2. (A) 3. (A) 4. (C) 5. (A) 6. (A) 7. (D) 8. (B) 9. (A) 10. (B)
11. (B) 12. (A) 13. (A) 14. (C) 15. (B) 16. (D) 17. (D) 18. (D) 19. (B) 20.
(B)
21. (A) 22. (B) 23. (D) 24. (A) 25. (B)
1. You can keep your personal files/folders
in—
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Answer: My
Documents
2. The primary purpose of software is to turn
data into—
(A) Web sites
(B) Information
(C) Programs
(D) Objects
(E) None of these
Answer: Information
3. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Answer: Sub
Directory
4. A compiler translates a program written in
a high-level language into—
(A) Machine language
(B) An algorithm
(C) A debugged program
(D) Java
(E) None of these
Answer: Machine
language
5. When you turn on the computer, the boot
routine will perform this test—
(A) RAM test
(B) Disk drive test
(C) Memory test
(D) Power-on self-test
(E) None of these
Answer: Disk
drive test
6. A ……is a unique name that you give to a
file of information.
(A) device letter
(B) folder
(C) filename
(D) filename extension
(E) None of these
Answer: filename
extension
7. Hardware includes—
(A) all devices used to input data into a
computer
(B) sets of instructions that a computer runs
or executes
(C) the computer and all the devices connected
to it that are used to input and output data
(D) all devices involved in processing
information including the central processing unit, memory and storage
(E) None of these
Answer: (D)
8. A ……… contains specific rules and words
that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Answer: programming
language
9. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Answer: Recycle
Bin
10. The simultaneous processing of two or more
programs by multiple processors is—
(A) Multiprogramming
(B) Multitasking
(C) Time-sharing
(D) Multiprocessing
(E) None of these
Answer: Multiprocessing
11. The secret code that restricts entry to
some programs—
(A) Password
(B) Passport
(C) Entry-code
(D) Access-code
(E) None of these
Answer: Password
12. Computers use the ……… number system to
store data and perform calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Answer: binary
13. The main function of the ALU is to—
(A) Perform arithmetic and logical operations
(B) Store data and information for future use
(C) Control computer output, such as printing
(D) Monitor all computer activities
(E) None of these
Answer: Perform
arithmetic and logical operations
14. ……is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Answer: Executing
15. Softcopy is the intangible output, so then
what is hardcopy ?
(A) The physical parts of the computer
(B) The printed parts of the computer
(C) The printed output
(D) The physical output devices
(E) None of these
Answer: The
printed output
16. A(n) ……… is a program that makes the
computer easier to use.
(A) utility
(B) application
(C) operating system
(D) network
(E) None of these
Answer: utility
17. A complete electronic circuit with
transistors and other electronic components on a small silicon chip is called
a(n)—
(A) Workstation
(B) CPU
(C) Magnetic disk
(D) Integrated circuit
(E) None of these
Answer: Integrated
circuit
18. Computer systems are comprised of—
(A) Hardware, programs, processors, procedures
and people
(B) Hardware, programs, information, people
and procedures
(C) Hardware, programs, information, people
and networks
(D) Hardware, software, procedures, networks
and people
(E) None of these
Answer: Hardware,
software, procedures, networks and people
19. An error in a computer program—
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
(E) None of these
Answer: Bug
20. What is output ?
(A) What the processor takes from the user
(B) What the user gives to the processor
(C) What the processor gets from the user
(D) What the processor gives to the user
(E) None of these
Answer: What the
processor gives to the user
1. Which of the following's absence the computer
system can still be functional
A. Operating system
|
B. Hard Drive
C. RAM
D. Sound Card
2.The name for the
way that computers manipulate data into information is called:
A. programming
B. processing
C. storing
D. organizing
3.When you are working on a document
on a PC where is the document temporarily stored ?
A. Hard Disk
B. ROM
C. RAM
D. CD-ROM
4. A set of instructions telling the
computer what to do is called:
A. Program
B. Compiler
C. Debugger
D. Mentor
5. The term "hypertext" means:
A. Text with heavy formatting
B. Blinking text
C. Hyper media
D. None of the above
6. What is the extension of executable program under windows ?
A. .doc
B. .txt
C. .bin
D. .exe
7. Which of the following is optical storage media ?
A. CD-ROM
B. EEPROM
C. Optical ROM
D. None of the above
8. What is the other name for a LAN Card?
A. NIC
B. Network Connector
C. MODEM
D. Internet Card
9. Computer security can be enforced by using which of
the following ?
A. Firewall
B. Password
C. Encryption
D. All of the above
10. Which of the following is a
database management tool developed by Microsoft?
A. dBase
B. Access
C. Personal Oracle
D. Sybase
11. URL stands for:
A. Uniform Research List
B. Uniform Research Locator
C. Uniform Resource Locator
D. Universal Resource List
12. Speed of computer is calculated in the units of :
A. RPM
B. Hertz
C. kmh
D. mth
13. Primary memory stores :
A. Data alone
B. Programs alone
C. Results alone
D. All of these
14. Junk e-mail is also called
A. Spoof
B. Spam
C. Spill
D. Sniffer script
15. DPI stands for :
A. Due Protocol Inspection
B. Do Per Instruction
C. Dots Per Inch
D. None of the above
Questions
1:
Which
of the following is not true of the traditional approach to information
processing
a.
there is common sharing of data among the various applications
b. it
is file oriented
c. programs are
dependent on the file
d. it
is inflexible
e.
all of the above are true
Question
2:
Which of the following
hardware component is the most important to the operation of database
management system?
a.
high resolution video display
b.
printer
c.
high speed, large capacity disk
d.
plotter
e.
mouse
Question
3:
Generalized database management
system do not retrieve data to meet routine request
a.
true
b.
false
Question
4:
Batch
processing is appropriate if
a.
large computer system is available
b. only a small
computer system is avilbale
c.
only a few transactions are involved
d.
all of the above
e.
none of the above
Question
5:
Large
collection of files are called
a.
fields
b.
records
c. database
d.
sectors
Question
6:
Which
of the following is not a relational database?
a.
dBase IV
b.
4th Dimension
c.
FoxPro
d. Reflex
Question
7:
In order to use
a record management system
a.
you need to understand the low level details of how information is stored
b.
you need to understand the model the record management system uses
c.
bother a and b
d.
none of the above
Question
8:
Sort/Report
generators
a.
are faster than index/report generators
b.
require more disk space than indexed/report generators
c. do
not need to sort before generating report
d.
both a and b
Question
9:
If a
piece of data is stored in two places in the database, then
a.
storage space is wasted
b.
changing the data in one spot will cause data inconsistency
c. in
can be more easily accessed
d.
both and b
Question
10:
An
audit trail
a. is
used to make backup copies
b. is
the recorded history of operations performed on a file
c.
can be used to restore lost information
d.
none of the above
Answers:
1.a 2.c 3. b
4.e 5.c 6.d
7.b 8.b 9.d
10.b
Questions 1:
The
relational database environment
has all of the following components except
a. users
b. separate files
c. database
d. query languages
e. database
Question 2:
Database management systems are intended
to
a. eliminate data redundancy
b.
establish relationship among
records in different files
c. manage file access
d. maintain data integrity
e. all of the above
Question 3:
One approach to standardization storing
of data?
a. MIS
b. structured programming
c. CODASYL specification
d. none of the above
Question 4:
The
language used application programs
to request data from the DBMS is
referred to as the
a. DML
b. DDL
c. query language
d. any of the above
e. none of the above
Question 5:
The highest level in the hierarchy
of data organization is called
a. data bank
b. data base
c. data file
d. data record
Question 6:
Choose the RDBMS which supports full
fledged client server application development
a. dBase V
b. Oracle 7.1
c. FoxPro 2.1
d. Ingress
Question 7:
Report generators are used to
a. store data input by a user
b. retrieve information from files
c. answer queries
d. both b and c
Question 8:
A form defined
a. where data is placed on the screen
b. the width of each field
c. both a and b
d. none of the above
Question 9:
A top-to-bottom relationship among the items in a database is established by a
a. hierarchical schema
b. network schema
c. relational schema
d. all of the above
Question 10:
The management information system (MIS) structure with one main computer
system is called a
a. hierarchical MIS structure
b. distributed MIS structure
c. centralized MIS structure
d. decentralized MIS structure
Answers:
1.b 2.e 3.c
4.a 5.b 6. b
7.d 8.a 9.a
10.c
Questions 1:
The ascending order of a data
hirerchy is:
a.
bit-byte-record-field-file-database
b. byte-bit-field-record-file-database
c.
bit-byte-field-record-file-database
d.
bit-byte-file-record-field-database
Question 2:
Which of the following is
true of a network structure?
a. t is a physical
representation of the data
b. It allows a many-to-many
relationship
c. It is conceptually simple
d. It will be dominant data
base of the future
Question 3:
Which of the following is a problem of file management system?
a. difficult to update
b. lack of data independence
c. data redundancy
d. program dependence
e. all of above
Question 4:
One data dictionery software
package is called
a. DB/DC dictionary
b. TOTAL
c. ACCESS
d. Datapac
e. Data Manager
Question 5:
The function of a database is
...
a. to check all input data
b. to check all spelling
c. to collect and organize
input data
d. to output data
Question 6:
What is the language used by
most of the DBMSs for helping their users to access data?
a. High level language
b. SQL
c. Query Language
d. 4GL
Question 7:
The model for a record management system might be
a. handwritten list
b. a Rolodex card file
c. a business form
d. all of above
Question 8:
Primitive operations common
to all record management system include
a. print
b. sort
c. look-up
d. all of above
Question 9:
In a large DBMS
a. each user can "see"
only a small part of the entire database
b. each subschema contains
every field in the logical schema
c. each user can access every
subschema
Question 10:
Information can be
transferred between the DBMS and a
a. spreadsheet program
b. word processor program
c. graphics program
d. all of the above
Answers:
1. c 2.
b 3. e 4. a
5. c 6. c 7. d 8.
c 9. a 10.
1.
These systems typically contain the system's electronic components and selected
secondary storage devices, but no input devices.
A.
Desktop systems
B.
Personal digital assistants
C.
Palm computers
D.
Laptop computers
2.
A byte is formed by a group of
A.
four bits.
B.
eight bits.
C.
12 bits.
D.
16 bits.
3.
Which of the following is not a binary code?
A.
EBCDIC
B.
ASCII
C.
CISC
D.
Unicode
4.
This coding system is designed to support international languages like Chinese
and Japanese.
A.
ASCII
B.
Unicode
C.
EBCDIC
D.
ANSIC
5.
On the motherboard, the connection points for chips are referred to as
A.
slots.
B.
sockets.
C.
ports.
D.
lines.
6.
Tiny circuit-boards etched onto squares of sand-like material called silicon
are called
A.
buses.
B.
slots.
C.
sockets.
D.
chips.
7.
Integrated circuits must be mounted on _____ which are then plugged into the
motherboard.
A.
slots
B.
pins
C.
ports
D.
carrier packages
8.
Which of the following is a function of the control unit?
A.
It provides pathways that support communication among the various electronic
components.
B.
It directs the control signals between the CPU and input and output devices.
C.
It performs fundamental math operations like addition, subtraction, etc.
D.
It uses the logic to compare two pieces of data.
9.
Pathways that support communication among the various electronic components on
the system board are called
A.
bus lines.
B.
network lines.
C.
logic paths.
D.
gateways.
10.
In a microcomputer system, the CPU is contained on a single chip called
the
A.
semiconductor.
B.
ALU.
C.
microprocessor.
D.
Control Unit.
11.
This term is used to describe the number of bits that a CPU can access at one
time.
A.
Bitrate
B.
Word
C.
Pulse width
D.
Character
12.
A 32-bit word computer can access
A.
2 bytes at a time.
B.
16 bytes at a time.
C.
4 bytes at a time.
D.
8 bytes at a time.
13.
Which of the following allow a computer to run two programs
simultaneously?
A.
Coprocessors
B.
Multiplexing
C.
Dual core chip
D.
Binary system
14.
These chips use special software to take a large program, break it down into
parts, and assign the parts to separate processors.
A.
Arithmetic-logic units
B.
Multiplexers
C.
Parallel processors
D.
Graphics coprocessors
15.
Visa, MasterCard, and American Express have all introduced this new type of
card, which has an embedded chip.
A.
Data card
B.
Micro card
C.
Smart card
D.
Embedded card
16.
An automatic identification system used to track objects, people or animals is
called a(n)
A.
image processor.
B.
smart card.
C.
RFID tag.
D.
NIC.
17.
Frequently-accessed information is held in
A.
hard drive.
B.
cache memory.
C.
flash memory.
D.
read only memory.
18.
With this type of memory, large programs are divided into parts and the parts
stored on a secondary device, usually a hard disk.
A.
Flash
B.
Cache
C.
Virtual
D.
Extended
19.
Which of the following provides flexibility and expandability for a computer
system?
A.
ROM
B.
RAM
C.
CMOS
D.
Cache
20.
All of the following are commonly used units of measurement to describe memory
capacity, except:
A.
Megabyte (MB).
B.
Gigabyte (GB).
C.
Terabyte (TB).
D.
Nanobyte (NB).
21.
When you reboot your system, the computer takes instructions to start from
the
A.
DRAM.
B.
SDRAM.
C.
DDR.
D.
ROM.
22.
Precisely timed electrical beats or impulses that indicate the speed of
processing or power of a computer system are called
A.
the clock speed.
B.
the beat.
C.
the pulse.
D.
the system speed.
23.
Which of the following is helpful in enhancing graphics performance, 3-D
animations and transferring video data?
A.
AGP
B.
ISA
C.
Graphic coprocessors
D.
FireWire buses
24.
These types of ports typically provide connections to specialized devices such
as camcorders.
A.
FireWire
B.
Serial
C.
Parallel
D.
AGP
25.
Which of the following ports is used for connecting musical instruments to a
sound card?
A.
AGP
B.
USB
C.
MIDI
D.
SCSI
26.
"Bit" is short for "binary information technology".
True False
27.
ASCII is the acronym for Automatic Standard Code for Information
Interchange.
True False
28.
Data created by a computer system using the ASCII coding scheme can be directly
accessed by another computer system using different coding schemes.
True False
29.
The ALU tells the rest of the computer system how to carry out a program's
instructions.
True False
30.
The control unit directs the movement of electronic signals between the memory
and the ALU.
True False
31.
64-bit processors are commonly being used in powerful microcomputers.
True False
32.
The more the number of bits, the slower the computer becomes.
True False
33.
RAM is considered as volatile storage.
True False
34.
Virtual memory is held in a RAM chip.
True False
35.
Information stored on CMOS chips cannot be altered by a user.
True False
36.
The speed of a computer's system clock cannot be varied.
True False
37.
PC cards were developed in order to meet the size constraints of notebook and
handheld computers.
True False
38.
The number of bits that can travel simultaneously down a bus is known as the
word size.
True False
39.
Accelerated graphics port (AGP) is over twice as fast as the ISA.
True False
40.
Serial ports send data one bit at a time and are very good for sending
information over long distances.
True False
41.
Parallel ports are mostly used to connect printers to the system unit.
True False
42.
Serial ports are gradually replacing USB ports.
True False
43.
The FireWire port used to connect a camcorder to a laptop would be as fast as a
USB 2.0 port.
True False
44.
FireWire is mainly used to connect digital camcorders and video editing
software.
True False
45.
A notebook computer would commonly use an IrDA port to transfer data to a
desktop computer.
True False
46.
Two of the most popular binary coding schemes are ASCII and _____.
________________________________________
47.
IBM developed the _____ binary coding scheme and it is used primarily for large
computers.
________________________________________
48.
The _____ acts as the communication center for a computer system.
________________________________________
49.
_____ are often expressed in word sizes.
________________________________________
50.
_____ operations consist of making comparisons.
________________________________________
51.
A _____ bit word computer can access eight bytes of information at a
time.
________________________________________
52.
_____ are special-purpose processing units that assist the CPU in performing
certain types of operations.
________________________________________
53.
_____ memory is non-volatile RAM and is considered quite expensive.
________________________________________
54.
_____ memory uses the hard drive to substitute for RAM.
________________________________________
55.
_____ provides start-up instructions for the computer when it is powered
on.
________________________________________
56.
The systems clock speed is measured in _____.
________________________________________
57.
A computer can process instructions if the _____ is fast.
________________________________________
58.
Network interface cards (NICs) are connected through _____ on the motherboard.
________________________________________
59.
_____ is a set of hardware and software standards used for creating operating
systems, processing units, and expansion boards, as well as other devices that
are able to configure themselves.
________________________________________
60.
A(n) _____ card connects the system board to the computer's monitor.
________________________________________
61.
To connect a computer to one or more other computers a(n) _____ card is
needed.
62.
To meet the size constraints, laptops use _____ cards.
________________________________________
63.
_____ buses are used for special applications and provide support for digital
camcorders and video editing software.
________________________________________
64.
_____ are mostly used to connect printers to the system unit.
________________________________________
65.
A(n) _____ gives us a wireless mechanism to transfer data between
devices.
________________________________________
66.
Describe the four types of system units.
67.
Describe the three binary coding systems.
68.
How is the dual-core chip useful for microcomputers?
69.
What is parallel processing?
70.
How is a smart card useful?
71.
What is Flash RAM? How is it different from other types of RAM?
72.
What is the difference between a modem and an NIC?
73.
Name four different types of expansion buses.
74.
What is the difference between a serial port and a parallel port?
75.
How would you transfer data from your desktop computer to a printer using an
IrDA port?
Chapter 6 The System Unit Key
1.
(p. 156)A
2.
(p. 158)B
3.
(p. 158)C
4.
(p. 158)B
5.
(p. 160)B
6.
(p. 160)D
7.
(p. 160)D
8.
(p. 161)B
9.
(p. 161)A
10.
(p. 161)C
11.
(p. 162)B
12.
(p. 162)C
13.
(p. 162)C
14.
(p. 162)C
15.
(p. 162)C
16.
(p. 163)C
17.
(p. 163)B
18.
(p. 164)C
19.
(p. 164)C
20.
(p. 164)D
21.
(p. 164)D
22.
(p. 165)A
23.
(p. 170)A
24.
(p. 171)A
25.
(p. 171)C
26.
(p. 158)FALSE
27.
(p. 158)FALSE
28.
(p. 158)FALSE
29.
(p. 161)FALSE
30.
(p. 161)TRUE
31.
(p. 162)TRUE
32.
(p. 162)FALSE
33.
(p. 163)TRUE
34.
(p. 164)FALSE
35.
(p. 164)FALSE
36.
(p. 165)TRUE
37.
(p. 167)TRUE
38.
(p. 167)FALSE
39.
(p. 170)FALSE
40.
(p. 170)TRUE
41.
(p. 170)TRUE
42.
(p. 170)FALSE
43.
(p. 171)TRUE
44.
(p. 171)TRUE
45.
(p. 171)TRUE
46.
(p. 158)EBCDIC
47.
(p. 158)EBCDIC
48.
(p. 159)motherboard
49.
(p. 162)Chip capacities
50.
(p. 162)Logical
51.
(p. 162)sixty-four
52.
(p. 162)Coprocessors
53.
(p. 163-164)Flash
54.
(p. 164)Virtual
55.
(p. 164)CMOS
56.
(p. 165)gigahertz
57.
(p. 165)clock speed
58.
(p. 166)expansion slots
59.
(p. 166)Plug and Play
60.
(p. 166)graphics
61.
(p. 166)Network Interface card (NIC)
62.
(p. 167)PC
63.
(p. 170)FireWire
64.
(p. 170)Parallel ports
65.
(p. 171)IrDA port
66.
(p. 156-158)The four types of system units are: tablet PC system unit,
desktop system unit, notebook system unit, and PDA system unit. The desktop
system unit can be placed horizontally (desktop) or vertically (tower). All
input devices are located outside the system unit. The notebook system unit is
portable and contains some integrated input devices, like a pointer and
keyboard. Tablet PC system units are similar to notebooks, but are designed to
use a stylus as the primary input device. The PDA system unit is very small
(palm sized) and contains the entire computer system.
67.
(p. 158)The three binary coding systems are ASCII, EBCDIC, and
Unicode. ASCII is the most widely used system. EBCDIC was developed by IBM for
use in large computers. Both of these systems use 8 bits per byte. Unicode was
developed with funding from several large software companies. It uses 16 bits
per byte to facilitate the storage of complex international alphabets.
68.
(p. 162)A microcomputer has a single CPU which does not allow the
computer to process heavy tasks. But with the help of a dual-core chip, even a
microcomputer can run all the complex programs that only large computers could
do. This is done through parallel processing.
69.
(p. 162)Parallel processing is the simultaneous use of more than one
CPU to run a program that allows faster execution and improved performance.
70.
(p. 162-163)A smart card is essentially a plastic card the size of a
regular credit card that has an embedded chip. It can store 80 times the
information stored on the magnetic strip of a regular credit card. It is used
for identification, providing access to a network, securing cellular phones,
securing set-top boxes on televisions, storing medical files, personal records
etc.
71.
(p. 163-164)Flash RAM or flash memory chips can retain data even if
power is disrupted. This type of RAM is the most expensive and used primarily
for special applications such as for digital cell telephones, digital video
cameras, and portable computers. It is different from other types of RAM
because it is considered as non-volatile RAM.
72.
(p. 166)While both allow you to connect to other computers, they work
in different ways. A modem translates an audio signal to connect you via the
telephone system. An NIC is used when this translation is not needed, such as a
network.
73.
(p. 170)Industry standard architecture (ISA), Peripheral component
interconnect (PCI), Accelerated graphics port (AGP), Universal serial bus
(USB), and FireWire buses (HPSB).
74.
(p. 170)A serial port can only send one data bit at a time and is very
good for sending data over a long distance. Parallel ports can send 8 bits at a
time and are primarily used to connect printers.
75.
(p. 171)An IrDA transmits infrared signals. Using this, we can
transfer data from one device to another without any cables. For example, if
both your desktop computer and printer have IrDA ports, you can simply put your
computer near the printer and take printouts without needing to connect the two
with a cable. The only thing is the two machines need is to be near each other.
Practice
set
Networking and Security
Multiple Choice:
1.
Which of the following is NOT an advantage of using
networks compared to a stand-alone computer?
A.
ease
of maintenance and administration
B.
enhanced
resource sharing
C.
increased
productivity
D.
increased
communication capabilities
2.
____________ networks may experience significant
slowdowns if more than ten (10) users are on the network.
A.
Wide
area
B.
Peer-to-peer
C.
Server-based
D.
Metropolitan
area
Answer:
B Reference:
Client/Server Networks Difficulty: Moderate
3.
All of the following statements are DISADVANTAGES of
peer-to-peer networks EXCEPT:
A.
P2P
networks do not require servers.
B.
security
cannot be implemented centrally on P2P networks.
C.
each
computer must be updated individually in P2P networks.
D.
P2P
networks are decentralized and not easily scalable.
Answer: A Reference:
Client/Server Networks Difficulty: Easy
4.
Individual users must take responsibility for data
backups and security on a peer-to-peer network because this kind of network is
considered:
A.
scalable.
B.
centralized.
C.
decentralized.
D.
dedicated.
Answer: C Reference:
Client/Server Networks Difficulty: Moderate
5.
The ability to easily add additional users means that a
network is:
A.
scalable.
B.
dedicated.
C.
decentralized.
D.
secure.
Answer: A Reference:
Client/Server Networks Difficulty: Moderate
6.
In a client/server network, all clients are connected
to a server that performs tasks for them, such as backup and security;
therefore, it is known as a ____________ network.
A.
local
area
B.
dedicated
C.
decentralized
D.
centralized
Answer: D Reference:
Client/Server Networks Difficulty: Easy
7.
A(n) ____________ is a small group of computers and
peripherals linked together in a small geographic area.
A.
LAN
B.
PAN
C.
CAN
D.
MAN
8.
The Internet is most accurately categorized as a:
A.
LAN.
B.
PAN.
C.
WAN.
D.
MAN.
Answer: C Reference:
Classifications of Client/Server Networks: LANS… Difficulty:
Easy
9.
PANs are used to connect ____________ devices (such as
Bluetooth-enabled devices) in close proximity to each other.
A.
peripheral
B.
wireless
C.
dedicated
D.
client
Answer: B Reference:
Classifications of Client/Server Networks: LANs… Difficulty: Easy
10.
A(n) ____________ is a private corporate network, used
exclusively by company employees.
A.
Internet
B.
local
area network
C.
peer-to-peer
D.
intranet
Answer: D Reference:
Constructing Client/Server Networks Difficulty: Moderate
11.
____________ is specialized software that runs on a
server computer to control network functionality.
A.
NOS
software
B.
NCP
software
C.
TCP
software
D.
MAC
software
Answer: A Reference:
Constructing Client/Server Networks Difficulty: Easy
12.
The layout and structure of the network is known as the
network’s:
A.
NOS.
B.
topology.
C.
components.
D.
protocol.
Answer: B Reference:
Constructing Client/Server Networks Difficulty: Easy
13.
Cable and wireless communication technologies are types
of:
A.
network
adapters.
B.
topologies.
C.
transmission
media.
D.
network
operating systems.
Answer: C Reference:
Constructing Client/Server Networks Difficulty: Moderate
14.
Network navigation devices include all of the following
EXCEPT:
A.
servers.
B.
routers.
C.
switches.
D.
hubs.
Answer: A Reference:
Constructing Client/Server Networks Difficulty: Easy
15.
____________ servers store and manage files for network
users.
A.
File
B.
Web
C.
Authentication
D.
Main
Answer: A Reference:
Constructing Client/Server Networks Difficulty: Moderate
16.
A(n) ____________ server keeps track of users logging
onto the network and the services available to the users.
A.
file
B.
authentication
C.
Web
D.
e-mail
Answer:
B Reference:
Servers Difficulty: Easy
17.
____________ servers are used to fulfill one specific
function, such as handling e-mail.
A.
Dedicated
B.
Network
C.
Protocol
D.
Peer-to-peer
Answer:
A Reference:
Servers Difficulty: Moderate
18.
____________ servers are used to manage all
client-requested printing jobs for all printers.
A.
Database
B.
Network
C.
Print
D.
E-mail
Answer:
C Reference:
Print Servers Difficulty: Easy
19.
A(n) ____________ server, on a network, delivers the
software to the clients because the software does not reside on the client
computers.
A.
Web
B.
application
C.
communications
D.
database
Answer:
B Reference:
Application Servers Difficulty: Easy
20.
The ____________ server, on a network, is the single
point of contact with the outside world and is often the only device connected
to the Internet.
A.
intranet
B.
database
C.
application
D.
communications
Answer: D Reference:
Communications Servers Difficulty: Challenging
21.
In a(n) ____________ topology, all computers are
connected in sequence, using a single cable.
A.
bus
B.
star
C.
hybrid
D.
ring
22.
In a bus topology, a ____________, located at each end
of the network, absorbs the signal to prevent it from being reflected back onto
the cable.
A.
node
B.
terminator
C.
packet
D.
network
device
Answer:
B Reference:
Bus Topology Difficulty: Easy
23.
In a bus topology, the nodes do nothing to move the
data along the network, making it a(n) ____________ topology.
A.
client/server
B.
active
C.
passive
D.
terminated
Answer:
C Reference:
Bus Topology Difficulty: Moderate
24.
Active topologies differ from passive topologies in
that nodes on the active topology network:
A.
help
pass the data along the network.
B.
listen
for signals on the line before transmitting.
C.
ultimately
send their messages to a terminator.
D.
actively
search for packets intended for themselves.
Answer:
A Reference:
Ring Topology Difficulty: Challenging
25.
When two computers send data at the same time on a bus
network it is called a(n):
A.
access
method.
B.
data
collision.
C.
active
topology.
D.
data
termination.
Answer:
B Reference:
Bus Topology Difficulty: Moderate
26.
In a ring topology, the computer in possession of the
____________can transmit data.
A.
packet
B.
data
C.
access
method
D.
token
Answer:
D Reference:
Ring Topology Difficulty: Moderate
27.
Because each node on the network is responsible for
retransmitting the token and the data to the next node, the ____________
topology is considered an active topology.
A.
ring
B.
bus
C.
star
D.
hybrid
Answer:
A Reference:
Ring Topology Difficulty: Moderate
28.
Which of the following statements about ring topology
networks is TRUE?
A.
A
ring topology network is plagued with data collisions.
B.
A
ring topology network uses the CSMA/CD access method to transmit data.
C.
A
ring topology network allows only one node to transmit data at a time.
D.
A
ring topology network is considered passive.
Answer:
C Reference:
Ring Topology Difficulty: Moderate
29.
In the star topology, the central point of failure is
the:
A.
client.
B.
switch.
C.
terminator.
D.
access
point.
Answer:
B Reference:
Star Topology Difficulty: Challenging
30.
Which of the following statements, concerning star
topology networks, is FALSE?
A.
Star
topology networks use the CSMA/CD access method.
B.
If
one computer fails, it does not affect the rest of the network.
C.
There
are no data collisions on a star topology network.
D.
If
the switch fails, the network no longer functions.
Answer:
C Reference:
Star Topology Difficulty: Challenging
31.
When a collision occurs on an Ethernet network, the
node that detects the collision sends a(n):
A.
token.
B.
packet.
C.
jam
signal.
D.
warning.
Answer:
C Reference:
Star Topology Difficulty: Moderate
32.
On an Ethernet network, after a collision occurs between
two computers and a jam signal is sent, what happens next?
A.
The
signals are encrypted to avoid a second collision.
B.
A
token is resent by the two computers that caused the collision.
C.
The
two computers wait random amounts of time, and then resend their signals.
D.
The
switch notifies the network of the collision.
Answer:
C Reference:
Star Topology Difficulty: Challenging
33.
Which of the following statements is FALSE concerning
bandwidth?
A.
Bandwidth
defines the speed at which the data flows on the network.
B.
Cable
is rated by the maximum amount of bandwidth it supports.
C.
Bandwidth
is the amount of data transmitted across the transmission medium in a certain
amount of time.
D.
Bandwidth
is measured in bits per second (bps).
34.
____________ defines whether the transmission media
uses electrical impulses or pulses of light to transmit data.
A.
Bandwidth
B.
Susceptibility
to interference
C.
Signal
transmission method
D.
Access
method
Answer: C Reference:
Wired Transmission Media Difficulty: Challenging
35.
EMI and RFI are types of:
A.
signal
interference.
B.
bandwidth
measurements.
C.
twisted
pair cable.
D.
wireless
transmission media.
Answer: A Reference:
Wired Transmission Media Difficulty: Moderate
36.
All of the following statements concerning twisted pair
cable are true EXCEPT:
A.
Twisted
pair uses pulses of light to send data.
B.
The
number of twists in twisted pair is significant because it makes the wires less
susceptible to interference.
C.
UTP
is not recommended in areas with significant sources of interference.
D.
The
two most common types of UTP in use today are Cat 5e and Cat 6.
Answer: A Reference:
Twisted Pair Cable Difficulty: Moderate
37.
UTP and STP are examples of:
A.
CATV
cable.
B.
thicknet
coaxial cable.
C.
fiber-optic
cable.
D.
twisted
pair cable.
Answer: D Reference:
Twisted Pair Cable Difficulty: Easy
38.
The core of a coaxial cable is usually made from:
A.
magnesium
oxide.
B.
copper.
C.
silicon.
D.
glass
fibers.
Answer: B Reference:
Coaxial Cable Difficulty: Easy
39.
All of the following statements regarding fiber-optic
cable are true EXCEPT:
A.
the
core of fiber-optic cable is composed of copper.
B.
fiber-optic
cable uses pulses of light to transmit data.
C.
data
passes through fiber-optic cable in one direction only.
D.
the
outer jacket of fiber-optic cables is often made of Kevlar.
Answer: A Reference:
Fiber-Optic Cable Difficulty: Moderate
40.
The wired medium least susceptible to signal
interference is:
A.
STP
cable.
B.
coaxial
cable.
C.
fiber-optic
cable.
D.
UTP
cable.
Answer: C Reference:
Fiber-Optic Cable Difficulty: Moderate
41.
____________ wireless devices have largely been
replaced with faster technology.
A.
802.11b
B.
802.11g
C.
802.11n
D.
802.11a
42.
All of the following protocols are proprietary EXCEPT:
A.
TCP/IP.
B.
IPX.
C.
NetBEUI.
D.
AFP.
Answer: A Reference:
Network Operating Systems Difficulty: Easy
43.
The major network operating systems for installation on
the server, in a client/server environment, include all of the following
EXCEPT:
A.
Windows
Server 2003.
B.
UNIX.
C.
Windows
XP.
D.
Novell
NetWare.
Answer: C Reference:
Network Operating Systems Difficulty: Easy
44.
The OSI model is divided into ____________ processes
called layers.
A.
five
B.
six
C.
seven
D.
eight
Answer: C Reference:
Dig Deeper: The OSI Model
Difficulty: Easy
45.
In the OSI model, the ____________ layer handles data
encryption and compression.
A.
application
B.
presentation
C.
data
link
D.
session
Answer: B Reference:
Dig Deeper: The OSI Model Difficulty: Challenging
46.
In the OSI model, the ____________ layer is responsible
for assembling the data packets into frames.
A.
session
B.
transport
C.
data
link
D.
network
Answer: C Reference:
Dig Deeper: The OSI Model Difficulty: Challenging
47.
The device that acts as an interface to connect with
and communicate on a network is known as the:
A.
network
adapter.
B.
hub.
C.
repeater.
D.
switch.
Answer: A Reference:
Network Adapters Difficulty: Easy
48.
Which of the following statements concerning MAC
addresses is TRUE?
A.
A
MAC address is used to externally
identify a computer on a network.
B.
The
MAC address and the IP address can be used interchangeably.
C.
A
MAC address must match the IP address.
D.
The
first three numbers in the address identify the manufacturer.
49.
If a network requires a cable to connect two devices
farther apart than the normal maximum run length of the media, the way to
prevent signal degradation is to install a(n):
A.
adapter.
B.
repeater.
C.
bridge.
D.
switch.
Answer: B Reference:
Repeaters and Hubs
Difficulty: Moderate
50.
Another name for a “smart” hub is a:
A.
bridge.
B.
repeater.
C.
firewall.
D.
switch.
Answer: D Reference:
Switches and Bridges Difficulty: Moderate
Fill in the Blank:
51.
____________ are designed to send information between
two networks.
Answer:
Routers Reference: Routers Difficulty: Easy
52.
The special communications software, installed on a
computer to enable the network adapter to communicate with the operating system
is called the ____________.
Answer: device driver Reference: Network Adapters Difficulty: Moderate
53.
Entering a user ID and password is known as
____________.
Answer:
authentication Reference:
Authentication Difficulty: Easy
54.
The acronym NOS stands for ____________.
Answer: Network Operating
System Reference: Network Operating Systems Difficulty: Easy
55.
NetBEUI, AFP, and IPX are known as ____________
protocols, which means that they do not work with another vendor’s NOS.
Answer: proprietary Reference: Network Operating Systems Difficulty:
Challenging
56.
The ____________ identifies a
computer internally on the network.
Answer: MAC address Reference: MAC Addresses Difficulty: Moderate
57.
In the OSI model, the ____________ layer converts the
data into signals for transmission over the network.
Answer: physical Reference:
Dig Deeper: The OSI Model Difficulty: Challenging
58.
Combining multiple topologies into one network is known
as a(n) ____________ network.
Answer: hybrid Reference: Comparing Topologies Difficulty: Easy
59.
CSMA/CD is the access method used on ____________
networks.
Answer: Ethernet Reference:
Star Topology Difficulty: Challenging
60.
The ____________ passing
method is used on a ring topology to avoid collisions.
Answer:
token Reference: Ring Topology Difficulty: Moderate
61.
____________ is the amount of
data that can be transmitted over transmission media in a certain amount of
time.
Answer: Bandwidth Reference: Wired Transmission Media Difficulty:
Challenging
62.
A(n) ____________ is a set of rules for exchanging
communication.
Answer:
protocol Reference:
Star Topology Difficulty: Easy
63.
____________ cable is composed of a glass or plastic
fiber (or bundle of fibers) as its core.
Answer:
Fiber-optic Reference: Fiber-Optic Cable Difficulty: Easy
64.
____________ networks do not need specialized network
operating system software.
Answer:
Peer-to-peer Reference: Network Operating Systems Difficulty: Moderate
65.
The 802.11 wireless standard is also known as
____________.
Answer:
Wi-Fi Reference: Wireless Media Options Difficulty: Easy
66.
In wireless networks, wireless NICs connect to
____________, which provide wireless devices with a sending and receiving
connection to the network.
Answer: wireless access points Reference:
Network Adapters Difficulty: Moderate
67.
____________ are containers that hold multiple data
packets.
Answer: Frames Reference: MAC Addresses Difficulty:
Challenging
68.
The acronym MAC, as in MAC address, stands for
____________.
Answer: Media Access Control Reference: MAC Addresses Difficulty:
Moderate
69.
A(n) ____________ sends data only to the intended
recipient as opposed to a hub, which sends the data to all devices connected to
it.
Answer: switch Reference: Switches and Bridges Difficulty:
Moderate
70.
____________ are devices used to send data between
different segments (collision domains) on a network.
Answer: Bridges Reference: Switches and Bridges Difficulty:
Easy
71.
____________ amplify a signal and retransmit it to
extend cable runs beyond the maximum run length.
Answer: Repeaters Reference:
Repeaters and Hubs Difficulty:
Moderate
72.
____________ is the open protocol used by the Internet.
Answer:
TCP/IP Reference: Network Operating Systems Difficulty:
Challenging
73.
EMI and RFI are types of ____________.
Answer: interference Reference: Wired Transmission Media Difficulty:
Easy
74.
The term packet screening refers to the examination of
incoming data packets by the ____________to ensure that they originate or are
authorized by valid users on the internal network.
Answer: firewall Reference: Firewalls Difficulty: Moderate
75.
____________ use IP addresses to send information
between two networks.
Answer: Routers Reference: Routers Difficulty: Moderate
True and False:
76.
In a ring topology, if one computer fails it can bring
the entire network to a halt.
Answer: True Reference: Ring Topology Difficulty: Easy
77.
An application server acts as a go-between for
computers on an internal network and the external network (Internet).
Answer: False (proxy) Reference: Firewalls Difficulty: Moderate
78.
The hub is responsible for breaking down data into
packets and preparing the packets for transmission across the network.
Answer: False (network adapter or NIC) Reference: Network Adapters Difficulty: Easy
79.
In the OSI model, the session layer sets up and manages
the virtual (not physical) connection between the sending and receiving
devices.
Answer: True Reference: Dig Deeper: The OSI Model Difficulty:
Challenging
80.
Twisted pair cable has the lowest susceptibility to
interference.
Answer:
False (highest) Reference: Figure 12.14: Comparison of
Characteristics… Difficulty: Moderate
81.
Throughput is another name for bandwidth.
Answer: True Reference:
Wired Transmission Media Difficulty:
Easy
82.
Crosstalk interference is the tendency of signals on
one twisted pair wire to interfere with signals on a wire next to it.
Answer: True Reference:
Twisted Pair Cable Difficulty: Easy
83.
The ring topology is the most widely deployed
client/server topology in businesses today.
Answer: False (star) Reference: Star Topology Difficulty: Moderate
84.
Token passing and CSMA/CD are methods of avoiding data
collisions.
Answer: True Reference: Network
Topologies Difficulty: Easy
85.
A bus topology provides a fairer allocation of
resources than a ring topology by giving all the nodes on the network an equal
opportunity to send data.
Answer: False Reference: Ring Topology Difficulty: Challenging
86.
MAC addresses enable computers on one network to
communicate with computers on another network.
Answer: False (IP addresses) Reference: MAC Addresses Difficulty: Moderate
87.
Bridges are relatively simple devices whose sole
purpose is to amplify a signal and retransmit it.
Answer: False (Repeaters) Reference:
Repeaters and Hubs Difficulty:
Challenging
88.
In a star network, the failure of one computer affects
the other computers on the network.
Answer: False Reference:
Figure 12.10: Advantages and Disadvantages of Bus,… Difficulty:
Easy
89.
Hubs receive a signal from a device, reconstruct it,
and transmit it to all the ports on the hub.
Answer: True Reference: Repeaters and Hubs Difficulty:
Challenging
90.
Authentication can be achieved through passwords,
biometric access devices, and possessed objects.
Answer: True Reference:
Authentication Difficulty: Easy
Matching:
91.
Match the following acronyms to their descriptions:
I. MAC A. type of interference
II. CSMA/CD B. device address
III. OSI C. Ethernet access method
IV. EMI D. type of cable
V. UTP E. protocol standard
Answer:
B,
C, E, A, D Reference: Multiple locations in chapter Difficulty: Moderate
92.
Match the following terms to their meanings:
I. frame A. packet granting
transmission rights
II. bastion B. assemblage of packets
III. token C. a Novell protocol
IV. IPX D. host configured as
proxy server
V. jam E. signal indicating data
collisions
Answer: B, D, A, C, E Reference: Multiple locations in chapter Difficulty:
Moderate
93.
Match the following devices to their functions:
I. repeater A. sends data to a specific
device, not to all devices
II. hub B. transmits data between
two different networks
III. switch C. device used for signal
amplification and retransmission
IV. bridge D. multiport device used for
signal amplification and broadcast
V. router E. connects collision domains
of a network
Answer: C, D, A, E, B Reference: Multiple locations in chapter Difficulty:
Challenging
94.
Match the following terms to their meanings:
I. topology A. communication rules
II. proxy B. large size coaxial cable
III. intranet C. server controlling Internet
access of network
IV. protocol D. private Web-based network
V. ThickNet E. layout of a network
Answer: E, C, D, A, B Reference: Multiple locations in chapter Difficulty:
Moderate
95.
Match the following acronyms to their descriptions:
I. TCP/IP A. proprietary communications
protocol
II. IPX B. software controlling
communications in a network
III. NOS C. network spanning a
metropolitan area
IV. MAN D. type of network adapter
V. NIC E. open communications
protocol
Answer: E, A, B, C, D Reference: Multiple locations in chapter Difficulty: Moderate
96.
Match the following OSI layers to their functions:
I. Session A. reformats, compresses, and
encrypts data
II. Presentation B. sets up a virtual connection between
sending and receiving devices and manages
communication
III. Data
Link C. determines where to
send the data packets on the network
IV. Transport D. assembles the data packets into
frames and delivers them to the physical layer
V. Network E. handles packet acknowledgment
Answer: B, A, D, E, C Reference: Dig Deeper: The OSI Model Difficulty: Challenging
97.
Match the following terms to their meanings:
I. bandwidth A. entering a user ID and password
II. bend
radius B. examining incoming data
packets to ensure they originated from an authorized user
III. ThinNet C. degree of flexibility in a
cable
IV. authentication D. a type of coaxial cable used for cable TV
V. packet
screening E.
amount of data that can be transmitted in a certain amount of time
Answer: E, C, D, A, B Reference: Multiple locations in chapter Difficulty:
Moderate
98.
Match the following terms to their meanings:
I. firewall A. a security measure, composed
of hardware or software, to protect a network from
attacks over the Internet
II. terminator B. a device that absorbs the signal to
prevent its reflection back onto the network
III. passive
topology C.
a special data packet on a ring topology
IV. access
method D. nodes on a network do nothing
to move data along the network
V. token E. controls how computers can
use the transmission media
Answer: A, B, D, E, C Reference: Multiple locations in chapter Difficulty:
Moderate
99.
Match the following terms to their meanings:
I. active
topology A. combining multiple
topologies into one network
II. hybrid B. the routes data
takes to flow between devices
III. transmission
media C.
each node on the network is responsible for retransmitting the signal
IV. device
driver D. a chunk of data
containing the address of the receiving computer
V. packet E. enables a device
to communicate with the operating system
Answer: C, A, B, E, D Reference: Multiple locations in chapter Difficulty:
Moderate
100.
Match the following terms to their meanings:
I. crosstalk A. tendency of signals on one wire
to interfere with signals on a wire next to it
II. CAT
6 B. can handle
bandwidth of 1 Gbps
III. open
protocol C. computers connected in
sequence on a single cable
IV. centralized D. not associated with one particular
vendor
V. bus E. characteristic of
client/server networks
Answer: A, B, D, E, C Reference: Multiple locations in chapter Difficulty:
Moderate
1.
DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
e.
none of these
answer
- D
2.
Which of the following is the correct order of the four major functions of a
computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
e.
None of these
answer
- D
3.
The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
e.
None of these
answer
- C
4.
. ____________ are specially designed computer chips that reside inside other
devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
E.
None of these
Answer
- B
5.
The steps and tasks needed to process data, such as responses to questions or
clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit
E.
None of these
Answer
- A
6.
. …..aim at the boot sector of a hard
drive by infecting a very crucial component of the boot process ?
A.File
infection virus
B.Boot
virus
C.Network
virus
D.E-mail
virus
e)None of these
Answer
- B
7.
One of the more recent e-mail scams, which lures internet users into revealing
personal information is referred to as :
A)
phishing
B)
flaming
C)blogging
D)pop-
ups
E)None
of these
Answer
- A
8.
Which file starts MS Word?
A)
Winword.exe
B)
Word.exe
C)
Msword.exe
D)
Word2003.exe
E)
None of these
Answer-
A
9.
What is the default left margin in Word 2003 document?
A)
1"
B)
1.25"
C)
1.5"
D)
2"
E)
None of these
Answer-
B
10.
Managers are using sophisticated tool to combat cyber slacking, especially
involving the internet such tools include ?
A)Web
filters
B)Surveillance
Software
C)Proxcy
Server
D)Packet
sniffer
E)All
Answer-
E
11.
Software, such as virus, worms and Trojan hores that has a malicious intent, is
known as
A)Spyware
B)Adware
C)Malware
D)Spam
E)None
of these
Answer
-C
12.
Portrait and Landscape are
A)
Page Orientation
B)
Paper Size
C)
Page Layout
D)
All of above
E)
None of these
Answer-
A
13.
Red triangle at the top right corner of a cell indicates
a.
There is an error in the cell
b.
There is a comment associated with the cell
c.
The font color of the text in cell is red
d.
The cell can't accept formula
e.
None of these.
Answer-
B
14.
Convert Binary number(101001101 to its equivalent hexadecimal number ?
15
E
15
D
14
D
13
E
None
of these
Answer
- C
15.
Wi-Max stand for ……
World
wide interoperability for microwave access
World
wide interoperation for microwave access
World
wide interoperation for microwave oven
Both
1 and 3
None
of these
Answer
-A
16.
RISC , CISC AND EPIC are types of
controller
processor
system
unit
micro
programming
none
of these
Answer
-B
17.Some
system programs that manage the
computer’s operation are stored in ROM as
Form
ware
Firmware
Firewall
Both
1 and 2
None
of these
Answer-B
18.example
of the utility software are…….
Disk
defragmenter
A)Virus
scanner
B)A
kruti publisher
C)Word
star
D)Both
1 and 2
E)None
of these
Answer-
D
19.for
page break which option of main menu is selected.
A)insert
B)window
C)tools
D)view
E)none
of these
Answer
-A
20.Which
of the following is not an alignment option ?
Left
Alignment
Right
alignment
Center
alignment
Justified
None
of these
Answer
-E
21.M.s
access is a software, which is based on the concept of…..
Word
processor
Spreadsheet
Database
Presentation
None
of these
Answer
-C
22.Single
in-line memory module (SIMM) and dual in-line memory module (DIMM) chips are
found in desktop. Who does consist these chips?
Rom
Ram
Prom
Both
1 and 2
None
of these
Answer
-B
23.A
computer’s CPU consists of million of tiny switches. They are called…….
bits
transistors
registers
bytes
none
of these
Answer-
B
24.Which
of the following bus technology enable the user to connect many devices through
single port.
USB
IEEE
1394
SCSI
All
None
of these
Answer-
C
25.
The capability of a program to run under different operating systems and or
hardware platforms…..
Multiprogramming
Multitasking
Platform
independence
Parallel
processing
None
of these
Answer-C
26.What
is instant message.(IM) ?
Relay
software
Chat
software
System
software
E-mail
software
None
of these
Answer
B
27.Microsoft
‘s SQL server is the fasted growing ……
Enterprise
Server
Network
server
DBMS
None
of these
Answer
-D
29.
. ____________ is data that has been organized or presented in a meaningful
fashion.
A. A process
B. Software
C. Storage
D. Information
E.
None of these
Answer-D
30.
………………. Is a collection of data that is organized so that its contents can
easily be accessed manage and updated.
Data
warehouse
Data
mining
Database
Data
dictionary
None
of these.
Answer-
C
31.
What is tuple ?
Another
name for table in RDBMS
Another
name for the key linking different table in database
Initial
source value of a field.
A
row of record in database table.
None
of these.
Answer
-D
32.
Arranging of data in a logical sequence is knows as …
Classifying
Searching
Sorting
Reproducing
None
of these
Answer-
C
33.
Which of the following is not a DBMS software
Foxpro
Oracle
Sybase
Database
2000
None
of these
Answer-D
34.
While working with Ms-Dos which command transfers a specific file from one disk
to another?
a. Copy
b. Diskcopy
c. Time
d. Rename
e. None of these
Answer-A
35.
Which of the following extensions suggest that the file is a backup copy
a. Bak
b. Bas
c. Com
d. Txt
e.
none of these
Answer
-A
36.
Terminal is a
(a)
device used to give supply to a computer
(b)
Point at which data may leave or enter the computer
(c)
ending point in a program
(d)
point where wires are interconnected
(e)
an input/output device
Answer-B
37.
For reproducing sound, a CD (Compact Disc) audio player uses a
(a)
quartz crystal
(b)
titanium needle
(c)
laser beam
(d)
barium titanium ceramic
(e)
none of these
Answer
C
38.
The memory of a computer is commonly expressed in terms of Kilobytes or
Megabytes. A byte is made up of
(a)
eight decimal digits
(b)
eight binary digits
(c)
two binary digits
(d)
two decimal digits
(e)
none of these
Answer-
B
39.
The computer device primarily used to provide hard copy is the
(a)
CRT
(b)
Line Printer
(c)
Computer Console (
d)
Card Reader
e.
None of these
Answer
- B
40.
First generation computer systems used
(a)
Transistors
(b)
Vacuum tubes
(c)
Magnetic cores
(d)
Silicon chips
e)
None of these
Answer
- B
41.
The most widely used commercial programming computer language is
(a)
BASIC
b)
COBOL
c)
FORTRAN
d)
PASCAL
e)
None of these
Answer-B
42.
A computer programmer
(a)
enters data into computer
(b)
writes programs
(c)
changes flow chart into instructions
(d)
provides solutions to complex problems
(e)
does total planning and thinking for a computer
Answer-E
43.
Which of the following floppy sizes exists?
(a)
5.25 inches
b)
4.75 inches
c) 6 inches
d)
8 inches
e.
None of these
Answer-A
44.
. A temporary storage area, attached to the CPU, for I/O operations, is a
(a)
Channel
b)
Buffer
c)
Register
d)
Core
e)
None of these
Answer-B
45.
Which of the following is true?
(a)
Plotters are not available for microcomputer systems
(b)
Micro-computer are not programmed like conventional computers
(c)
Mini-computers are task-oriented
(d)
The contents of ROM are easily changed
(e)
None of these
46.
What access method is used for obtaining a record from a casset the tape ?
Sequential
Direct
Sequential
Random
Both
2 and 3
None
of these
Answer
- A
47.
Which of the following circuit is used as a ‘Memory device’ in computers?
(a)
Rectifier
(b)
Flip-Flop
(c)
Comparator
(d)
Attenuator
(e)
none of these
Answer
- B
48
. ………….. is a device that connect two LAN or two segment of the same LAN.
a)
Bridges
b)
Switches
c)
Routers
d)
Hubs
e)
None of these
Answer-
A
49.
The most common media for data communication are ……
a)
Twisted-pair cable
b)
fiber-optic cable and wireless link
c)
co-axial cable
d)
All
e)
None of these
Answer
-D
50.
Data normalization in DBMS in used for ……..
Maintaining
data
Controlling
the data sedentary
Integrating
the database
Managing
the database
None
of these Answer
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
Ans : (C)
3. ______________ servers store and manages files for network
users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
Ans : (D)
4. All of the following are examples of real security and privacy
risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are
often connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
Ans : (B)
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
Ans : (C)
7. System software is the set of programs that enables your
computer’s hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
Ans : (D)
8. ________ are specially designed computer chips reside inside
other devices, such as your car or your electronicthermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
Ans : (B)
9. The following are all computing devices , except………
(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these
Ans : (C)
10. in a ring topology , the the computer in possession of the
______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
Ans : (D)
11. This part of operating system manages the essential
peripherals, such as the keyboard, screen , disk drives, and parallel and
serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left
in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
Ans : (B)
13. ________ controls the way in which the computer system
functions and provides a meAns : by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
Ans : (C)
14. Servers are computers that provide resources to other
computers connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
Ans : (A)
16. URL stands for ……..
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these
Ans : (C)
17. A database management system (DBMS) is a …………
(A) hardware system used to create , maintain and provide controlled access to
a database
(B) hardware system used to create, maintain, and provide uncontrolled access
to a database.
(C) software system used to create, maintain, and provide uncontrolled access
to a database.
(D) software system used to create, maintain, and provide controlled access to
a database.
(E) None of these
Ans : (D)
18. Which of the following is NOT a goal of transaction processing
system ?
(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these
Ans : ()
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (B)
20. When data changes in multiple lists and all lists are not updated,
this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these
Ans : (D)
21. _____________ are words that a programming language has set
aside for its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these
Ans : (B)
22. What is the primary difference between a virus and a worm?
(A) A worm has the ability to self-propagate from an infected user’s computer
to other computers
(B) A worm is usually written by a cracker: Script bunnies do not have the
skills to develop a worm program
(C) A virus is very harmful to the computers it infects : a worm is not a
serious a problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these
Ans : ()
23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these
Ans : (D)
24. You must install a (n)
____________ on a network if you want to share a broadband Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these
Ans : (A)
25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
Ans : (D)
26. Granting an outside organization access to internet web pages
is often implemented using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker
(E) None of these
Ans : (A)
27. Which term identifies a specific computer on the web and the
main page of the entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
Ans : (A)
28. The code that relational database management systems use to
perform their database task is referred to as …..
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
Ans : (B)
29. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) integrated circuit
(D) semiconductor
(E) None of these
Ans : (C)
30. The purpose of the primary key in a database is to:
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these
Ans : (B)
31. A _________ contains specific rules and words that express the
logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : ()
32. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these
Ans : (A)
33. The most frequently used instructions of a computer program
are likely to be fetched from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these
Ans : (B)
34. The ____________ contains data descriptions and defines the name,
data type, and length of each field in the database.
(A) data
dictionary
(B) data table
(C) data record
(D) data field
(E) None of these
Ans : (A)
35. Personal logs or journal entries posted on the Web are known
as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these
Ans : (C)
36. A(n) _______ uses pictures (called icons) and menus displayed
on the screen to send commands to the computer system.
(A) command – based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these
Ans : (B)
37. The _____ manual tells you how to use a software program.
(A) documentation
(B) programming
(C) technical
(D) user
(E) None of these
Ans : ()
38. Which of the following is NOT a type of broadband Internet
connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
(E) None of these
Ans : (C)
39. Software, such as viruses, worms and Trojan horses,
that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
Ans : (D)
40. Making a field ______ meAns : that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these
Ans : (B)
41. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
Ans : ()
42. ____________ are viruses that are triggered by the passage of
time or on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans : (C)
43. Linux is a (n) ____________ operating system.
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these
Ans : (A)
44. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system’s information
(C) The ability to get a system up and running in the event of a system crash
or failure
(D) All of these
(E) None of these
Ans : (D)
45. Which of the following places the common data elements in
order from smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these
Ans : (C)
46. The internet is ……
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
Ans : (D)
47. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these
Ans : (C)
48. All of the following are examples of real security and privacy
risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B
49. A process known as ____________ is used by large retailers to
study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A
50. ____________terminals (formerly known as cash registers) are
often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B
Q51.
…….. is a program which reproduces itself ?
Virus
Software
Program
Both
1 and 2
None
of these
Answer
-- A
Q2.
…..aim at the boot sector of a hard
drive by infecting a very crucial component of the boot process ?
File
infection virus
Boot
virus
Network
virus
E-mail
virus
None
of these.
Answer
- B
Q3.
One of the more recent e-mail scams, which lures internet users into revealing
personal information is referred to as :
phishing
flaming
blogging
pop-
ups
None
of these
Answer-
A
Q4.
Managers are using sophisticated tool to combat cyber slacking, especially
involving the internet such tools include ?
Web
filters
Surveillance
Software
Proxcy
Server
Packet
sniffer
All
Answer
-- E
Q5.
Software, such as virus, worms and Trojan hores that has a malicious intent, is
known as
Spyware
Adware
Malware
Spam
None
of these
Answer
- C
Q6.
Virus suspected mails come under ………
Sink
Spam
Both
1 and 2
Delete
None
of these
Answer
- B
Q7.
Malicious software is known as
Badware
Malware
Malicious
ware
Iiigalware
None
of these
Answer
- B
Q8.
Hardware or software designed to guard against authorized access to computer
network is known as …
Hacker
proof program
Firewall
Hacker
resistant server
Encryption
safe wall
None
of these
Answer-
B
1. All of the following are examples of real security and
privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as cash registers) are often connected
to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans
an item̢۪s tag and pulls up the current price (and any special offers) as you
shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal̢۪s
computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing
functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track
in a database all of the animal̢۪s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through
computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by copyright, available to everyone, is
considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges
from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display
the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ____________ is data that has been organized or presented in a meaningful
fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into information is
called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to ____________
data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed
appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet, each number and each
special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
28. The ____________, also called the â€Å“brains†of the computer, is
responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
31. ____________ is a set of computer programs used on a computer to help
perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
32. System software is the set of programs that enables your computer̢۪s
hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
33. The PC (personal computer) and the Apple Macintosh are examples of two
different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data
and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
35. Servers are computers that provide resources to other computers connected
to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
36. Smaller and less expensive PC-based servers are replacing ____________ in
many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
37. ____________ are specially designed computers that perform complex
calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
39. The difference between people with access to computers and the Internet and
those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
40. ____________ is the science revolving around the use of nanostructures to
build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
41. Which of the following is the correct order of the four major functions of
a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
45. ____________ controls the way in which the computer system functions and
provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
47. ____________ are specially designed computer chips that reside inside other
devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
48. The steps and tasks needed to process data, such as responses to questions
or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
50. The metal or plastic case that holds all the physical parts of the computer
is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
Fill in the Blank:
51. Between PCs and Macs, the ____________ is the platform of choice for
graphic design and animation.
Answer: Mac
52. The ____________ is the program that manages the hardware of the
computer system, including the CPU, memory, storage devices, and input/output
devices.
Answer: operating system
53. The type of operating system software you use depends on your
computer̢۪s ____________.
Answer: platform
54. ____________software helps you carry out tasks, such as typing a
document or creating a spreadsheet.
Answer: Application
55. ____________are the fastest and most expensive computers.
Answer: Supercomputers
56. A ____________ is approximately 1,000 bytes.
Answer: kilobyte
57. Input devices are used to provide the steps and tasks the computer needs
to process data, and these steps and tasks are called ____________.
Answer: instructions
58. A computer gathers data, processes it, outputs the data or information,
and ____________ the data or information.
Answer: stores
59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1
60. A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)
61. The devices you use to enter data into a computer system are known as
____________ devices.
Answer: input
62. The devices on a computer system that let you see the processed
information are known as ____________ devices.
Answer: output
63. ____________ is the set of computer instructions or programs that
enables the hardware to perform different tasks.
Answer: Software
64. When you connect to the ____________, your computer is communicating
with a server at your Internet service provider (ISP).
Answer: Internet
65. ____________ are computers that excel at executing many different
computer programs at the same time.
Answer: Mainframes
66. ____________is the application of computer systems and techniques to
gather legal evidence.
Answer: Computer forensics
67. ____________ is the science that attempts to create machines that will
emulate the human thought process.
Answer: Artificial intelligence (AI)
68. Macintosh computers use the Macintosh operating system (Mac OS), whereas
PCs generally run ____________ as an operating system.
Answer: Microsoft Windows
69. A process known as ____________ tracks trends and allows retailers to
respond to consumer buying patterns.
Answer: data mining
70. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage
71. You would use ____________ software to create spreadsheets, type
documents, and edit photos.
Answer: application
72. ____________ are computers that support hundreds or thousands of users
simultaneously.
Answer: Mainframes
73. ____________ is the term given to the act of stealing someone̢۪s
identity and ruining their credit rating.
Answer: Identity theft
74. Surgeons are using ____________ to guide robots to perform delicate
surgery.
Answer: computers
75. Patient ____________ are life-sized mannequins that have a pulse and a
heartbeat and respond to procedures just like humans.
Answer: simulators
True and False
76. Currently, the performance of tasks by robots is based on preprogrammed
algorithms.
Answer: True
77. Data can be a number, a word, a picture, or a sound.
Answer: True
78. Strictly defined, a computer is a data processing device.
Answer: True
79. The discrepancy between the â€Å“haves†and â€Å“have-nots†with regard
to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)
80. One of the benefits of becoming computer fluent is being a savvy
computer user and consumer and knowing how to avoid viruses, the programs that
pose threats to computer
security.
Answer: True
81. Trend-spotting programs, developed for business, have been used to
predict criminal activity.
Answer: True
82. Employers do not have the right to monitor e-mail and network traffic on
employee systems used at work.
Answer: False
83. Clicking on an icon with the mouse is a form of giving an instruction to
the computer.
Answer: True
84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)
85. The CPU and memory are located on a special circuit board in the system
unit called the motherboard.
Answer: True
86. Nanostructures represent the smallest human-made structures that can be
built.
Answer: True
87. The main difference between a supercomputer and a mainframe is that
supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to
handle many programs running at the same time (but at a slower pace).
Answer: True
88. Being computer fluent means that you should be able to build a computer
yourself.
Answer: False
89. Embedded computers are self-contained computer devices that have their
own programming and do not receive input.
Answer: True
90. A Web browser is a special device that is installed in your computer
that allows it to communicate with other devices on a network.
Answer: False (network adapter)
91. With a wireless network, it is easier to relocate devices.
Answer: True
92. The most common type of memory that the computer uses to process data is
ROM.
Answer: False (RAM)
Practice Set --- using
system software:
the operating system, utility programs, and file management
101.
All of the following are tasks performed by the
operating system EXCEPT:
A.
managing
hardware on the computer.
B.
controlling
the way application programs work with the CPU.
C.
performing
housekeeping tasks like file compression and disk defragmentation.
D.
providing
an interface for users to interact with the computer.
Answer:
C Reference:
System Software Basics Difficulty: Moderate
102.
All of the following are operating system categories
EXCEPT:
A.
real-time.
B.
single-user,
single-task.
C.
single-user,
multitask.
D.
virtual.
Answer:
D Reference:
Operating System Categories Difficulty: Easy
103.
The ____________ is like a traffic cop that coordinates
the flow of data and information through the computer system and provides a way
for the user to interact with the computer.
A.
CPU
B.
operating
system
C.
utility
program
D.
RAM
Answer:
B Reference:
What the Operating System Does Difficulty:
Easy
104.
Digital storage oscilloscopes, Mars Exploration Rovers
and the Mars Reconnaissance Orbiter require a ____________ operating system.
A.
real-time
B.
single-user,
single-task
C.
single-user,
multitask
D.
multiuser
Answer:
A Reference:
Real-Time Operating Systems Difficulty: Moderate
105.
A real-time operating system, as defined in the text,
is most likely to be used for:
A.
desktop
and laptop PCs.
B.
cell
phones and PDAs.
C.
supercomputers.
D.
fuel-injection
systems in car engines.
Answer:
D Reference:
Real-Time Operating Systems Difficulty: Moderate
106.
Which one of the following statements is TRUE?
A.
Single-user
operating systems are commonly used in robotics.
B.
Windows
and Macintosh operating systems are the most commonly used single-user
multitask operating systems.
C.
Supercomputers
use single-user multitask operating systems.
D.
Single-user
multitask operating systems are also known as network operating systems.
Answer:
B Reference:
Operating System Categories Difficulty: Challenging
107.
The MS-DOS operating system is a:
A.
graphical
user interface, single-task operating system.
B.
“user-friendly”
multitask operating system.
C.
command-driven
interface, single-task operating system.
D.
graphical
user interface that executes in real-time.
Answer:
C Reference:
Single-User Operating Systems Difficulty: Moderate
108.
All of the following are examples of multiuser
operating systems EXCEPT:
A.
Novell
Netware.
B.
Symbian.
C.
Windows
Server 2003.
D.
UNIX.
Answer:
B Reference:
Multiuser Operating Systems Difficulty: Moderate
109.
Linux is a(n) ____________ operating system.
A.
Windows
B.
Microsoft
C.
open-source
D.
Mac
Answer:
C Reference:
Linux Difficulty: Moderate
110.
The ____________ operating system does NOT have a
graphical user interface.
A.
Windows
XP
B.
MS-DOS
C.
Windows
CE
D.
Mac
OS
Answer:
B Reference:
Single-User Operating Systems Difficulty: Moderate
111.
The operating system does all of the following EXCEPT:
A.
provide
a way for the user to interact with the computer.
B.
manage
the central processing unit (CPU).
C.
manage
memory and storage.
D.
enable
users to perform a specific task such as document editing.
Answer:
D Reference:
What the Operating System Does Difficulty: Moderate
112.
During the boot process, the ____________ looks for the
system files.
A.
CD
B.
BIOS
C.
CPU
D.
DVD
Answer:
B Reference:
The Boot Process: Starting Your Computer Difficulty: Easy
113.
____________ are lists of commands that appear on the
screen.
A.
GUIs
B.
Icons
C.
Menus
D.
Windows
Answer:
C Reference:
The User Interface Difficulty: Easy
114.
____________ is the ability of an operating system to
control the activities of multiple programs at the same time.
A.
Multitasking
B.
Streamlining
C.
Multiuser
D.
Simulcasting
Answer:
A Reference:
Processor Management Difficulty: Easy
115.
The unique signal, generated by a device, that tells
the operating system that it is in need of immediate attention is called an:
A.
action.
B.
event.
C.
interrupt.
D.
activity.
Answer:
C Reference:
Processor Management Difficulty: Challenging
116.
The operating system controls access to the processor
by assigning a(n) ____________ to each task requiring the processor’s
attention.
A.
CPU
B.
slice
of time
C.
stack
D.
event
Answer:
B Reference:
Processor Management Difficulty: Challenging
117.
The blocks of code, included in the operating system,
that software applications interact with are known as:
A.
application
programming interfaces (APIs).
B.
complimentary
metal-oxide conductors (CMOS).
C.
device
drivers.
D.
bootstrap
loaders.
Answer:
A Reference:
Software Application Coordination Difficulty: Moderate
118.
MS-DOS is a ____________ operating system.
A.
point-and-click
B.
user-friendly
C.
command-driven
D.
Mac
Answer:
C Reference:
Single-User Operating System Difficulty: Moderate
119.
An interrupt handler is a(n):
A.
location
in memory that keeps track of recently generated interrupts.
B.
peripheral
device.
C.
utility
program.
D.
special
numeric code that indicates the priority of a request.
Answer:
D Reference:
Processor Management Difficulty: Challenging
120.
A spooler is a(n):
A.
location
in memory that maintains the contents of a document until it prints out.
B.
print
job.
C.
program
that coordinates the print jobs that are waiting to print.
D.
message
sent from the printer to the operating system when a print job is completed.
Answer:
C Reference:
Processor Management Difficulty: Challenging
121.
Virtual memory is typically located:
A.
on
a floppy disk.
B.
in
the CPU.
C.
in
a flash card.
D.
on
the hard drive.
Answer:
D Reference:
Memory and Storage Management Difficulty: Easy
122.
The purpose of a swap (or page) file is to:
A.
maintain
pages of documents that are being spooled to the printer.
B.
hold
a program’s data or instructions in virtual memory when it can’t fit in RAM.
C.
prevent
thrashing in a multitasking environment.
D.
allow
multiple print jobs to print their pages out simultaneously.
Answer:
B Reference:
Memory and Storage Management Difficulty: Moderate
123.
The definition of thrashing is:
A.
swapping
data between virtual memory and RAM too frequently.
B.
insufficient
hard disk space.
C.
too
many processors being managed by the operating system.
D.
inaccurate
information stored in the registry.
Answer:
A Reference:
Memory and Storage Management Difficulty: Moderate
124.
All of the following are TRUE of Safe Mode EXCEPT:
A.
Safe
Mode is a special diagnostic mode.
B.
Safe
Mode loads all nonessential icons.
C.
Safe
Mode allows users to troubleshoot errors.
D.
Safe
Mode loads only the most essential devices.
Answer:
B Reference:
Handling Errors in the Boot Process Difficulty: Moderate
125.
Verification of a login name and password is known as:
A.
configuration.
B.
accessibility.
C.
authentication.
D.
logging
in.
Answer:
C Reference:
Configurations and Customizations Difficulty: Moderate
126.
The combination of the operating system and the
processor is referred to as the computer’s:
A.
CPU.
B.
platform.
C.
BIOS.
D.
CMOS.
Answer:
B Reference:
Desktop Operating Systems Difficulty: Easy
127.
The following message generally means:
A.
B.
A.
a
nonsystem floppy has been left in the floppy disk drive.
B.
the
CD drive is not functioning.
C.
the
BIOS is corrupted.
D.
there
is a problem loading a device.
Answer:
A Reference:
Handling Errors in the Boot Process Difficulty: Moderate
128.
Which of the following is the correct sequence of
actions that takes place during the boot-up process?
A.
Load
operating system à Activate BIOS Ã
Perform POST Ã Check
configuration settings
B.
Activate
BIOS Ã Perform POST Ã
Load operating system à Check
configuration settings
C.
Perform
POST Ã Load operating system Ã
Activate BIOS Ã Check
configuration settings
D.
Activate
BIOS Ã Check configuration settings Ã
Perform POST Ã Load operating
system
Answer:
B Reference:
The Boot Process: Starting Your Computers Difficulty: Challenging
129.
All of the following are steps involved in the boot
process EXCEPT:
A.
load
the operating system into RAM.
B.
the
power-on self-test.
C.
activate
the basic input/output system (BIOS).
D.
load
application programs.
Answer:
D Reference:
The Boot Process: Starting Your Computers Difficulty: Easy
130.
The ____________, stored on a ROM chip, is responsible
for loading the operating system from its permanent location on the hard drive
into RAM.
A.
BIOS
B.
API
C.
device
driver
D.
supervisor
program
Answer:
A Reference:
Step 1: Activating BIOS Difficulty: Moderate
131.
The basic input/output system (BIOS) is stored in:
A.
RAM.
B.
ROM.
C.
the
CPU.
D.
the
hard drive.
Answer:
B Reference:
Step 1: Activating BIOS Difficulty: Easy
132.
Ensuring that the essential peripheral devices are
attached and operational is the ____________ process.
A.
configuration
B.
CMOS
C.
POST
D.
ROM
Answer:
C Reference:
Step 2: Performing the Power-On Self-Test Difficulty: Easy
133.
The memory resident portion of the operating system is
called the:
A.
registry.
B.
API.
C.
CMOS.
D.
kernel.
Answer:
D Reference:
Step 3: Loading the Operating System Difficulty: Easy
134.
Which of the following does NOT occur during the
power-on self-test (POST)?
A.
The
ScanDisk utility begins to run.
B.
The
video card and video memory are tested.
C.
The
BIOS identification process occurs.
D.
Memory
chips are checked to ensure they are working properly.
Answer:
A Reference:
Step 2: Performing the Power-On Self-Test Difficulty: Moderate
135.
All of the following are TRUE regarding virtual memory
EXCEPT:
A.
any
amount of RAM can be allocated to virtual memory.
B.
the
setting for the amount of hard drive space to allocate to virtual memory can be
manually changed.
C.
this
temporary storage is called the swap file (or page file).
D.
virtual
memory is physical space on the hard drive.
Answer:
A Reference:
Memory and Storage Management Difficulty: Moderate
136.
The operating system allows users to organize the
computer’s contents in a hierarchical structure of directories that include all
of the following EXCEPT:
A.
files.
B.
folders.
C.
drives.
D.
systems.
Answer:
D Reference:
Organizing Your Computer: File Management Difficulty: Easy
137.
All of the following statements concerning windows are
true EXCEPT:
A.
windows
are an example of a command-driven environment.
B.
windows
can be resized and repositioned on the desktop.
C.
more
than one window can be open at a time.
D.
toolbars
and scrollbars are features of windows.
Answer:
A Reference:
The Desktop and Window Features Difficulty: Easy
138.
All of the following statements concerning files are
true EXCEPT:
A.
A
file is a collection of related pieces of information stored together for easy
reference.
B.
Files
can be generated from an application.
C.
Files
are stored in RAM.
D.
Files
should be organized in folders.
Answer:
C Reference:
Organizing Your Files Difficulty: Moderate
139.
Using Windows Explorer, a plus (+) sign in front of a
folder indicates:
A.
an
open folder.
B.
the
folder contains subfolders.
C.
a
text file.
D.
a
graphics file.
Answer:
B Reference:
Organizing Your Files Difficulty: Moderate
140.
In Windows XP, if you want to see the file size and
modified dates of all files in a folder, the best viewing option is the
__________ view.
A.
List
B.
Thumbnails
C.
Details
D.
Icon
Answer:
C Reference:
Viewing and Sorting Files and Folders Difficulty: Moderate
141.
In Windows XP, an especially good way to display
folders containing picture files is the __________ view.
A.
List
B.
Thumbnails
C.
Details
D.
Icon
Answer:
B Reference:
Viewing and Sorting Files and Folders Difficulty: Easy
142.
Which of the following statements is FALSE concerning
file names?
A.
Files
may share the same name or the same extension but not both.
B.
The
file extension comes before the dot (.) followed by the file name.
C.
Every
file in the same folder must have a unique name.
D.
File
extension is another name for file type.
Answer:
B Reference:
Naming Files Difficulty: Easy
143.
Which of the following characters CANNOT be used in a
file name when using the Windows XP operating system?
A.
Hyphen
(-)
B.
Underscore
(_)
C.
Colon
(:)
D.
“At”
symbol (@)
Answer:
C Reference:
Naming Files Difficulty: Moderate
144.
If you select a file on your PC hard drive and press
the Delete key, it will be:
A.
permanently
removed from the system.
B.
removed
from the system, but it can be recovered using special utility programs.
C.
placed
on a backup floppy disk or CD.
D.
sent
to the Recycle Bin folder.
Answer:
D Reference:
Working with Files Difficulty: Easy
145.
What happens when a file is emptied from the Recycle
Bin?
A.
It
is moved to RAM.
B.
Its
reference is removed, but the file remains until overwritten.
C.
It
is compressed.
D.
It
is copied to a storage device.
Answer:
B Reference:
Bits and Bytes: Need to Recover a Deleted… Difficulty: Moderate
146.
Add/Remove Programs and Display are found in:
A.
System
Restore.
B.
Task
Manager.
C.
Control
Panel.
D.
Task
Scheduler.
Answer:
C Reference:
Utility Programs Difficulty: Challenging
147.
All of the following are included in the file path
EXCEPT:
A.
the
drive.
B.
all
folders and subfolders.
C.
the
file name.
D.
the
file view.
Answer:
D Reference:
Naming Files Difficulty: Easy
148.
The ____________ collects scattered pieces of files on
the hard disk and rearranges them sequentially on the hard drive.
A.
ScanDisk
utility
B.
disk
defragmenter
C.
disk
cleanup program
D.
file
compression utility
Answer:
B Reference:
Dig Deeper: Hard Disk Defragmenter Utilities Work Difficulty: Moderate
149.
FAT and NTFS are:
A.
file
management utility programs.
B.
part
of the boot process.
C.
programs
for managing and scheduling tasks on the system.
D.
file
systems.
Answer:
D Reference:
Dig Deeper: How Disk Defragmenter Utilities Work Difficulty: Challenging
150.
To restore your Windows XP computer to the state it was
in on a previous date, you can use the ____________ utility.
A.
System
Restore
B.
Task
Manager
C.
Defragment
D.
Backup
Answer:
A Reference:
System Restore and Backup Utilities Difficulty: Easy
Fill
in the Blank:
151.
The ____________ is the feature of the program that
allows the user to communicate with the computer system.
Answer:
user
interface Reference: System Software Basics Difficulty: Moderate
152.
____________ is an open-source operating system based
on UNIX and designed for use on personal computers.
Answer:
Linux Reference: Linux Difficulty: Moderate
153.
GNOME is a graphical user interface, used by the
____________ operating system.
Answer:
Linux Reference: The User Interface Difficulty: Moderate
154.
Windows 2003/XP, Mac OS X, and Linux are examples of
the ____________ category of operating system.
Answer:
single-user,
multitask Reference: Operating Systems Categories Difficulty:
Moderate
155.
After the system files are loaded into RAM, the
____________, the essential component of the operating system is loaded and
remains in RAM the entire time the computer is powered on.
Answer: kernel (or supervisor program) Reference: Step 3: Loading the
Operating System Difficulty:
Challenging
156.
The ____________ contains all the different
configurations (settings) used by the operating system and by other
applications.
Answer: registry Reference: Step4: Checking Further
Configurations and Customizations Difficulty: Moderate
157.
The verification of your login name and password at the
end of the boot process is called ____________.
Answer: authentication Reference: Step4:
Checking Further Configurations and Customizations Difficulty: Easy
158.
____________ refers to the actual lines of
instructional code that make the program work.
Answer:
Source
code Reference: Trends in IT: Emerging Technologies… Difficulty:
Challenging
159.
When the operating system processes a task assigned a
higher priority before processing a task with a lower priority this is called
____________.
Answer:
preemptive
multitasking Reference: Processor Management Difficulty: Challenging
160.
If a printer is in use, the operating system puts a
print request in a temporary storage area of RAM called the ____________.
Answer:
buffer Reference: Processor Management Difficulty: Moderate
161.
A(n) ____________ is when a user restarts the system
after it is already on.
Answer:
warm
boot Reference: Bits and Bytes: What’s the
Difference Difficulty: Easy
162.
The process of optimizing RAM storage by borrowing hard
drive space is called ____________.
Answer: virtual memory Reference:
Memory Storage and Management Difficulty: Challenging
163.
Devices attached to a computer come with a special
program called a(n) ____________.
Answer:
device
driver Reference: Hardware and Peripheral Device Management Difficulty: Moderate
164.
After installing a device driver, if the system becomes
unstable or crashes, Windows XP has a(n) ____________ feature that reinstalls
the old driver.
Answer: Roll Back Driver Reference: Hardware and
Peripheral Device Management Difficulty: Challenging
165.
The ____________ is the part of the file identification
that follows the dot (.).
Answer:
extension
(or file type) Reference: Naming Files Difficulty: Easy
166.
C:\My
Documents\Spring 2006\TechNotes is a(n)
____________.
Answer:
file
path Reference: Working with Files Difficulty: Easy
167.
The ____________ is a special kind of memory that uses
almost no power and contains information about the system’s memory, types of
disks, and other essential input/output hardware components.
Answer:
CMOS Reference:
Step 2: Performing the Power-On Self-Test Difficulty: Challenging
168.
____________
appear at the side or bottom of the screen to control what part of the window
is displayed.
Answer:
Scrollbars Reference:
The Desktop and Windows Features Difficulty: Easy
169.
The most recent version of the Mac operating system
(Mac OS X 10.4 Tiger) is based on ____________.
Answer:
UNIX Reference: Mac OS Difficulty: Challenging
170.
The ____________ utility can be used to easily remove
temporary Internet files from the hard disk.
Answer:
Disk
Cleanup Reference: System Maintenance Utilities Difficulty:
Moderate
171.
Error-checking, once known as ScanDisk, finds
____________, or physical errors on the disk, and helps prevent the operating
system from using these areas in the future.
Answer:
bad
sectors Reference: System Maintenance Utilities Difficulty:
Moderate
172.
____________ is a tool included in Windows XP that
gathers information about the computer when there is a program error and
automatically creates a text log file.
Answer:
Dr.
Watson for Windows Reference: System Maintenance Utilities Difficulty:
Challenging
173.
____________ is a file system, supported by Windows XP,
that supports larger hard drives and larger file sizes that the FAT.
Answer: NTFS Reference: Dig Deeper: How Disk
Defragmenter Utilities Work Difficulty: Easy
174.
The concentric circles on hard disks are called
____________.
Answer: tracks Reference: Dig Deeper: How Disk
Defragmenter Utilities Work Difficulty: Easy
175.
Every time you start your computer, or when a new
application or driver is installed, Windows XP automatically creates a snapshot
of your entire system’s settings called a(n) ____________.
Answer:
restore
point Reference: System Restore and Backup Utilities Difficulty:
Moderate
True
and False:
176.
The queue is
where prints jobs are placed while waiting to be processed.
Answer:
True Reference: Processor Management Difficulty: Easy
177.
A network requires a multiuser operating system.
Answer:
True Reference: Multiuser Operating Systems Difficulty: Easy
178.
A graphical user interface (GUI) uses windows, menus,
and commands.
Answer:
False
(icons) Reference: The User Interface Difficulty: Moderate
179.
Most application software is platform-dependent.
Answer:
True Reference: Desktop Operating Systems Difficulty:
Moderate
180.
In 1984, Windows became the first operating system to
incorporate a Graphical User Interface (GUI).
Answer:
False
(Mac OS) Reference: Mac OS Difficulty: Easy
181.
The stack is
a special numerical code that prioritizes requests to the CPU.
Answer:
False
(interrupt handler) Reference: Processor Management Difficulty: Challenging
182.
The condition of excessive paging, which eventually
slows down the computer system, is known as swapping.
Answer:
False
(thrashing) Reference: Processor Management Difficulty: Moderate
183.
The swap file is also known as the page file.
Answer:
True Reference: Memory and Storage Management Difficulty: Easy
184.
The devices whose drivers are included in Windows are
called Plug and Play (PnP).
Answer:
True Reference:
Hardware and Peripheral Device Management Difficulty: Easy
185.
The main files of the operating system are known as the
system files.
Answer:
True Reference: Step 3: Loading the Operating System Difficulty:
Easy
186.
Files stored on the same device or folder can share
both the same name and the same extension.
Answer:
False Reference: Naming Files Difficulty: Easy
187.
APIs are small applications, incorporated into the
operating system, that perform special functions, such as manage system
resources or improve efficiency.
Answer:
False
(Utility programs) Reference: Utility Programs Difficulty: Moderate
188.
Disk Defragmenter is a Windows utility that cleans
unnecessary files from your hard drive.
Answer:
False
(Disk Cleanup) Reference: System Maintenance Utilities Difficulty:
Moderate
189.
In Windows XP, the additional information displayed
when you place your cursor over a file icon is known as a dialog box.
Answer: False (ScreenTip) Reference: Viewing and Sorting Files
and Folders Difficulty: Moderate
Matching:
190.
Match the following operating systems with their
characteristic features:
I. Lynx A. open source
II. Palm
OS B. used in personal
digital assistants
III. Mac
OS C. network operating
system
IV. Linux D. primarily for Apple
computers
V. Novell
Netware E. real-time operating system
Answer:
E,
B, D, A, C Reference: Operating System Categories Difficulty: Challenging
191.
Match the following file extensions with their
application types:
I. .xls A. Access database
II. .doc B. compressed file
III. .htm C. Word document
IV. .zip D. Excel file
V. .mdb E. Web page
Answer:
D,
C, E, B, A Reference: Figure 5.20 Filename Extensions Difficulty: Easy
192.
Match the following acronyms with their descriptions:
I. NTFS A. command-driven PC
operating system
II. API B. user interface
involving windows and icons
III. DOS C. system for managing and
organizing files on disk
IV. GIF D. file format for
representing graphical information
V. GUI E. blocks of program code
for performing common functions
Answer: C, E, A, D, B Reference: Multiple locations in chapter Difficulty:
Moderate
193.
Match the following terms with their definitions:
I. platform A. picture that represents an
object such as a software application
II. menu B. a list of commands that
appear on a screen
III. icon C. a special location in
RAM
IV. window D. combination of a computer’s
operating system and processor
V. stack E. rectangular box displayed
on a screen that contains programs
Answer: D, B, A, E, C Reference: Multiple locations in chapter Difficulty:
Moderate
194.
Match the following acronyms with their definitions:
I. OS A. a type of file
system
II. ROM B. system software
III. CMOS C. a type of display
IV. LCD D. complementary
metal-oxide semiconductor
V. FAT E. a type of memory
Answer: B, E, D, C, A Reference: Multiple locations in chapter Difficulty:
Easy
195.
Match the following terms with their definitions:
I. tracks A. another term meaning to
“open” a file
II. sectors B. smallest segment within a
sector
III. cluster C. pie-shaped wedges on a hard
drive
IV. write D. another term meaning to
“save” a file
V. read E. concentric circles on a
hard drive
Answer: E, C, B, D, A Reference: Dig Deeper: How Disk Defragmenter Difficulty: Moderate
196.
Match the following utility programs with their
functions:
I. File
compression A.
removes redundancies in a file to reduce the size
II. Task
Manager B. removes
unnecessary files from the hard drive
III. System
Restore C. enables users to
check on a program or exit a nonresponding program
IV. Error-checking D. allows users to restore system
settings back to a specific date
V. Disk
Cleanup E. once known as
ScanDisk, it checks for lost files and fragments
Answer: A, C, D, E, B Reference: Utility Programs Difficulty: Moderate
197.
Match the following terms with their definitions:
I. Recycle
Bin A. also known as the “file extension”
II. .rtf B. a file format that
can be read by any word processing program
III. “/”, “:”, “\” C. a folder on the desktop where files
deleted from the hard drive reside
IV. file
type D. helps users manage
files and folders
V. Windows
Explorer E.
path separators
Answer: C, B, E, A, D Reference: Dig Deeper: How Disk Defragmenter… Difficulty:
Moderate
198.
Match the following views with their definitions:
I. Tiles A. displays files and
folders as very small icons with file names
II. Details B. displays files and folders
as small icons with no other information beside the file
name
III. Icon C. displays files and
folders in list form, which can be sorted by column headings
IV. Thumbnails D. displays the contents of folders as
small images
V. List E. displays files and
folders as icons in list form and includes filename,
application,
and size
Answer: E, C, B, D, A Reference: Viewing and Sorting Files and Folders Difficulty:
Challenging
199.
Match the following terms with their definitions:
I. root
directory A. a collection of related
pieces of information stored together as a single unit
II. folder B. a collection of files
III. file C. a storage device
represented by a letter
IV. file
management D.
the top of the filing structure of the computer system
V. drive E. provides organizational
structure to the computer’s contents
Answer: D, B, A, E, C Reference: Organizing Your Files Difficulty: Moderate
200.
Match the following terms with their definitions:
I. file
name A. identifies which
application should be used to read the file
II. dot
(.) B. separates the
filename from the file extension
III. file
extension C. folders within the
primary folder
IV. file
path D. the name assigned to
a file when it is saved
V. subfolders E. identifies the exact location of a
file
Answer: D, B, A, E, C Reference: Naming Files
Difficulty: Moderate
Find the answer of
these question below of the questions……
Q1
Data going in to the computer is called –
(1)
output (2)
algorithm
(3)
input (4)
calculations
(5)
flow chart
Transformation
of input into output is performed by-
(1)
peripherals (2) memory
(3)
storage (4)
Input Output Unit
(5)
CPU
A
collection of program that controls now your computer system runs and processes
information called-
(1)
Operating System (2) Computer
(3)
Office (4)
Compiler
(5)
Interpreter
A
set of instructions telling the computer what to do is called –
(1)
Mentor (2)
Instructor
(3)
Compiler (4)
Program
(5)
Debugger
Which
of the following can handle most system functions that aren’t handled directly
by operating system?
(1)
Vertical Market application
(2)
Utilities
(3)
Algorithms
(4)
Integrated software
(5)
Compilers
Which
of the following refers to the memory in your computer?
(1)
RAM (2) DSL
(3)
USB (4)
LAN
(5)
CPU
One
megabyte equals approximately-
(1)
1,000 bits (2) 1,000
bytes
(3)
1 million bytes (4) 1 million
bits
(5)
2,000 bytes
How
are data organized in spreadsheets?
(1)
Line and Spaces (2)
Layers and Planes
(3)
Height and Width (4) Rows and
Columns
(5)
None of these
When
cutting and pasting, the item cut is temporarily stored in-
(1)
ROM (2)
Hard drive
(3)
Diskette (4) Dash
Board
(5)
Clipboard
An
operating system version designed for home use in Microsoft Windows XP-
(1)
Home edition (2) Media
Edition
(3)
Tablet PC Edition (4) Standard PC
Edition
(5)
None of these
When
you press and release the secondary mouse button you are-
(1)
Right Clicking (2) Left
Clicking
(3)
Double Clicking (4)
either (1) or (2)
(5)
Neither (1) nor (2)
A
_ is a flash memory storage device that plugs in to a USB port.
(1)
USB Snap drive (2) USB Flash
drive
(3)
USB Memory market drive
(4)
All of these (5) None
of these
A
Graphical User Interface displays-
(1)
Graphics (2) Text
(3)
both (1) and (2) (4)
Neither (1) nor (2)
(5)
None of these
Underlined
text, such as text and folder names is referred to as a __.
(1)
Hyperlink (2) Menu
(3)
Source drive (4) Resource
locator
(5)
None of these
An
operating system version designed for use with Tablet PC is Microsoft Windows
XP ___.
(1)
Home Edition (2) Media
Center Edition
(3)
Tablet PC Edition (4) Standard PC
Edition
(5)
None of these
The
___ contains commands associated with my computer window.
(1)
Standard Menu (2)
Start Menu
(3)
System Menu (4) file Menu
(5)
None of these
The
___ is the drive containing the files to be copied.
(1)
Source drive (2)
destination drive
(3)
USB drive (4) Port
drive
(5)
None of these
A
___ is pointing device.
(1)
Monitor (2) Mouse
(3)
Keyboard (4) Printer
(5)
None of these
One
Million byte of information is abbreviated as –
(1)
Bit (2) KB
(3)
MB (4)
GB
(5)
None of these
Microsoft’s
latest operation system is-
(1)
Vista (2)
Vista Advanced
(3)
Windows XP (4) Windows 7
(5)
None of these
What
is the other name of the LAN Card?
(1)
Modem (2) NIC
(3)
Internet Card (4) Network
Connector
(5)
None of these
When
using characters is windows, what does windows use?
(1)
ASCII (2)
UNICODE
(3)
MORSE (4) IDBC
(5)
WESTRN
How
fast is fast Ethernet?
(1)
10 Mbps (2) 100
Mbps
(3)
256 kbps (4) 1 Gbps
(5)
10 Gbps
Which
is not true?
(1)
Google is a search engine.
(2)
Ubuntu is system software
(3)
Windows XP launched 2001
(4)
BUZZ is an e-commerce
(5)
None of these
In
Excel, the default worksheet opens with-
(1)
one worksheet (2) two
worksheets
(3)
three worksheets (4) four
worksheets
(5)
None of these
In
H2O the figure 2 is appeared lowered, which effect has been applied?
(1)
Grammar options (2) Spelling
options
(3)
Opposite words
(4)
Synonyms and Antonyms
(5)
None of these
What
is the shortcut of Research command in MS Word?
(1)
Alt + Click (2) F3
(3)
Ctrl + F (4) F7
(5)
None of these
A
process known as ___ is used by large retailers to study trends.
(1)
data mining (2) data
selection
(3)
POS (4)
data conversion
(5)
None of these
A(n)
____ system is a small, wireless handled computer that scans in ‘item’s tag and
pull up the current price and any special offers as you shop.
(1)
PSS (2)
POS
(3)
Inventory (4) Data
mining
(5)
Data capsulation
Which
of the following is NOT one of the Major data processing functions of a
computer?
(1)
Gathering data
(2)
Processing data into information
(3)
Analyzing the data or information
(4)
String the data or information
(5)
None of these
Surgeons
can perform delicate operations by manipulating device through computers
instead of manually. This technology is known as-
(1)
Robotics (2)
Computer Forensics
(3)
Simulation (4)
Forecasting
(5)
None of these
___
is the study of molecules and structures whose size ranges from 1 to 100
nanometres.
(1)
Nano Sciences (2)
Microelectrodes
(3)
Computer Forensics (4) Artificial
Intelligence
(5)
None of these
___
is data that has been organized or presented in meaningful fashion.
(1)
Process (2)
Software
(3)
Storage (4)
Information
(5)
None of these
Computer
gather data, which means that they allow users to ___ data.
(1)
Present (2)
Input
(3)
Output (4)
Store
(5)
None of these
Computer
process data into information by working exclusively with:
(1)
Multimedia (2) words
(3)
characters (4)
Numbers
(5)
None of these
In
the binary language each letter of the alphabet, each number and each special
character is made up of unique combination of –
(1)
eight byte (2) eight
kilobyte
(3)
eight characters (4)
eight bits
(5)
None of three
A
string of eight OS and IS is called a –
(1)
Megabyte (2) byte
(3)
Kilobyte (4)
gigabyte
(5)
None of these
A
___ is a approximately a million bytes –
(1)
Gigabyte (2) Kilobyte
(3)
Megabyte (4) Terabyte
(5)
None of these
The
components that process data are located in the-
(1)
input devices (2) Output
devices
(3)
System unit (4) Storage
component
(5)
None of these
Which
of the following are examples of input devices except a:
(1)
Scanner (2)
Speaker
(3)
CD (4)
Printer
(5)
None of these
The
___ button on the quick access toolbar allows you to cancel your recent
commands or actions.
(1)
Search (2) Cut
(3)
Documents (4) Undo
(5)
None of these
___
Software allows users to perform calculations on rows and column of data.
(1)
Word Processing (2)
Presentation
(3)
Database management system
(4)
Electronic Spreadsheet
(5)
None of these
___
cells involves creating a single cells by combining two or more selected cells.
(1)
formatting (2) Merging
(3)
Embedding (4) Splitting
(5)
None of these
When
you quickly press and release the left mouse button twice, you are ___.
(1)
Primary –clicking (2) Pointing
(3)
Double-clicking (4)
Secondary-clicking
(5)
None of these
To
delete an incorrect character in a document ___ to erase to the right of
insertion point.
(1)
press the left mouse key
(2)
double-click the right mouse key
(3)
press the backspace key
(4)
press the delete key
(5)
None of these
___
are lists of commands that appear on the screen.
(1)
GUIs (2) Icons
(3)
Menu (4)
Windows
(5)
None of these
The
unique signal, generated by a device, that tells the operating system that it
is in need of immediate attention is called an-
(1)
Action (2)
Event
(3)
Interrupt (4)
Activity
(5)
None of these
The
CPU and memory are located on the-
(1)
expansion board (2)
Motherboard
(3)
Storage device (4) Output
device
(5)
None of these
___
is a set of computer programs used on a computer to help perform tasks.
(1)
An instruction (2) Software
(3)
Memory (4) A processor
(5)
None of these
___
bits equal one byte.
(1)
Eight (2)
Two
(3)
One thousand (4) One million
(5)
None of these
|
Qns.
|
Ans.
|
Qns.
|
Ans.
|
Qns.
|
Ans.
|
Qns.
|
Ans.
|
Qns.
|
Ans.
|
1.
|
3
|
11.
|
1
|
21.
|
2
|
31.
|
1
|
41.
|
4
|
2.
|
5
|
12.
|
2
|
22.
|
4
|
32.
|
1
|
42.
|
3
|
3.
|
2
|
13.
|
3
|
23.
|
2
|
33.
|
4
|
43.
|
2
|
4.
|
4
|
14.
|
1
|
24.
|
4
|
34.
|
2
|
44.
|
3
|
5.
|
1
|
15.
|
3
|
25.
|
3
|
35.
|
4
|
45.
|
4
|
6.
|
1
|
16.
|
3
|
26.
|
3
|
36.
|
4
|
46.
|
3
|
7.
|
3
|
17.
|
1
|
27.
|
1
|
37.
|
2
|
47.
|
3
|
8.
|
4
|
18.
|
2
|
28.
|
4
|
38.
|
3
|
48.
|
2
|
9.
|
5
|
19.
|
3
|
29.
|
1
|
39.
|
3
|
49.
|
2
|
10.
|
1
|
20.
|
4
|
30.
|
3
|
40.
|
1
|
50.
|
1
|
Q1When
using characters in Windows, what code does Windows use?
(1)
ASCII (2)
UNICODE
(3)
MORSE (4) IDBC
(5)
WESTRN
In
Windows XP, which shortcut is used to cycle through opened items in taskbar?
(1)
Ctrl _ TAB (2) Alt +
TAB
(3)
Ctrl + Esc (4) Alt
+ Esc
(5)
None of these
In
Excel, the default workbook opens with
(1)
One Worksheets (2) Two Worksheets
(3)
Three Worksheets (4) Four Worksheets
(5)
None of these
Which
of the following is fastest memory?
(1)
DDM RAM (2) DDR2 RAM
(3)
DDR3 RAM (4) Swap
Memory
(5)
Buffer Memory
Which
of the following layers of OSI reference model provides the service of errors
detection and control to the highest layer?
(1)
Data Link (2)
Application
(3)
Presentation (4) Session
(5)
None of these
____
is an animated character that gives help in MS Office?
(1)
officer worker (2) Comic
Assistant
(3)
Office Assistant (4)
all of the above
(5)
None of these
To
avoid the wastage of memory, the instruction length should be
(1)
Multiple of character size only
(2)Of
word size only
(3)Of
file size only
(4)
Of word size which is multiple of character size
(5)
None of these
A
Laptop or Notebook marked 802.1 In its feature, it means device support
(1)
Bluetooth (2) W:MAX
(3)
USB (4)
Wi-Fi LAN
(5)
3G
In
(H2) the figure 2 is appeared lowered. Which effect has been
applied?
(1)
Superscript (2) Lowered
(3)
Subscript (4) Laid
Down
(5)
None of these
What
is other name of LAN CARD
(1)
Modem (2) NIC
(3)
Internet Card (4) Network
Connector
(5)
None of these
A
plotter is
(1)
An input device to produce good quality graphics
(2)
An output device to produce drawings and graphics
(3)
A fast output device using camera lenses
(4)
All of the above
(5)
None of these
Information
retrieval is fastest from
(1)
Floppy disk (2)
Magnetic tape
(3)
Hard Disk (4) CD-ROM
(5)
None of these
LILO
is used for
(1)
creation of boot diskette
(2)
managing linux network
(3)
stack
(4)
Linux configuration
(5)
None of these
An
application in Windows based package can be opened through shortcut on desktop
by
(1)
Double clicking on its shortcut
(2)
Right clicking and choosing ‘open’ option
(3)
Selecting the icon and pressing Enter key
(4)
All of the above
(5)
None of these
GUI
is used as an interface between
(1)
hardware and software (2) man and
machine
(3)
software and user (4) All of the
above
(5)
None of these
Which
of the following is a part of the Central processing Unit?
(1)
Printer (2) Key
Board
(3)
Mouse
(4)
Arithmetic & Logic Unit
(5)
None
A
fault in a computer programme which prevents it from working correctly is known
as
(1)
Boot (2)
BUG
(3)
Biff (4)
strap
(5)
None of these
The
16 Bit Microprocessor means that it has
(1)
16 address lines (2)
16 Buses
(3)
16 Data lines (4) 16
routes
(5)
None of these
What
is a ‘tuple’?
(1)
another name for a table in an RDBMS.
(2)
Another name for the key linking different tables in a database.
(3)
Initial seed value of field.
(4)
A row or record in a database table.
(5)
An attribute attached to a record.
__
is the ability of an operating system to control the activities of multiple
programs at the same time.
(1)
Multitasking (2)
Streamlining
(3)
Multiuser (4)
Simulation
(5)
None of these
A
spooler is a(n):
(1)
location in memory that maintains the contents of a document until it prints
out
(2)
Print job
(3)
Program that coordinates the print jobs that are waiting to print
(4)
Message sent from the printer to the operating system when a print job is
completed
(5)
None of these
The
combination of the operating system and the processor is referred to as the computer’s
:
(1)
CPU (2)
Platform
(3)
BIOS (4)
CMOS
(5)
None of these
All
of the following statements concerning files are true EXCEPT:
(1)
A file is a collection of related pieces of information stored together for
easy reference.
(2)
Files can be generated from an application
(3)
Files are stored in RAM
(4)
Files should be organized in folders.
(5)
None of these
The
four main functions of a computer are:
(1)
Input, processing, output and storage
(2)
Learning, thinking, intelligence and virtuosity
(3)
Data, information, bits and bytes
(4)
Hardware, software, modeling and operations
(5)
None of these
A
scientific institution performing intensive mathematical operations for a
complex model that required extremely powerful computing capabilities will most
likely use a(n):
(1)
Supercomputer (2)
PC
(3)
mainframe (4) ISP
(5)
None of these
The
‘brains’ of the computer which executes the instructions, is called the:
(1)
CPU (2)
RAM
(3)
Motherboard (4) System Unit
(5)
None of these
The
process ___ involves automated study of consumer buying patterns in order to
support marketing, inventory replenishment and pricing decisions.
(1)
transaction processing (2) Data
mining
(3)
Simulation
(4)
information processing
(5)
None of these
The
Principle advantage of adding memory to a printer is to increase:
(1)
resolution (2) Print
Speed
(3)
Number of colors in output
(4)
DPI (5)
None of these
An
operating system version designed for use with media Centre PC is Microsoft
Windows XP ___.
(1)
Home Edition (2) Media
Centre Edition
(3)
Tablet PC Edition (4) None of
these
(5)
None of these
Press
the ___ button to have the window fill the entre screen.
(1)
close (2)
Maximize
(3)
Minimize (4) All of
the above
(4)
None of these
What
digits are representative of all binary numbers?
(1)
0 (2) 1
(3)
both 0 and 1 (4) 3
(5)
None of these
The
‘IC’ Chip, used in computers, is made of
(1)
Chromium (2) Iron
oxide
(3)
Silica (4)
Silicon
(5)
None of these
The
memory sizes in mainframe computers and advanced technology micro computer are
expressed as
(1)
Bytes (2)
Kilo-bytes
(3)
Bits (4)
Megabytes
(5)
None of these
The
function of Key F4 is
(1)
Delete (2)
Repeat last function
(3)
Refresh (4) Copy
(5)
None of these
Viruses,
Trojan horses and worms are
(1)
able to harm computer system
(2)
unable to detect if affected on computer
(3)
use-friendly applications
(4)
harmless applications resident on computer
(5)
None of these
Magnetic
tape is not practical for applications where data must be quickly recalled
because tape
(1)
A random-access medium
(2)
A sequential –access medium
(3)
A read –only medium
(4)
Fragile and easily damaged
(5)
An expensive storage medium
The
__ allows you to choose where to go and is located below the standards buttons
toolbar.
(1)
system menu (2) Address bar
(3)
Menu bar (4) None of
these
(5)
None of these
In
windows XP, which shortcut is used you lock the computer?
(1)
Ctrl + L (2)
Windows Key + k
(3)
Ctrl + K (4)
Scroll Lock key
(5)
Windows Key + L
A
dot-matrix printer
(1)
is an input-output device
(2)
is an output device only
(3)
is an input device only
(5)
both 2 and 3
(5)
None of these
A
characteristic of card system is
(1)
slowness in processing data
(2)
using cards as records of transactions
(3)
needing a larger data staff
(4)
all of these
(5)
None of these
The
retrieval of information from the computer is defined as
(1)
Collection of data
(2)
data retrieved operations
(3)
output
(4)
data output collection
(5)
None of these
A
temporary storage area, attached to the CPU, for I/O operations, is a
(1)
Channel (2)
Buffer
(3)
Register (4) Core
(5)
None of these
MS-DOS
is the name of a/an
(1)
Application Software (2) Hardware
(3)
System Software (4)
All of the above
(5)
None of these
A
term associated with the comparison of processing speed is
(1)
FFTS (2)
MPG
(3)
MIPS (4)
CPS
(5)
None of these
Bit
refers to a:
(1)
Computer language (2) CPU instruction
(3)
0 or 1 value
(4)
Digital representation of an alphabetical character
(5)
None of these
The
Prefix that stands for ‘billionth’ is:
(1)
Giga (2)
Tera
(3)
Nano (4)
Peta
(5)
None of these
What
type of port sends data one bit at a time?
(1)
Serial (2)
Parallel
(3)
USB (4)
Firewire
(5)
None of these
Using
Windwos Explorer, a plus (+) sign in front of a folder indicates:
(1)
an open folder
(2)
the folder contains subfolder
(3)
a text file (4) a
graphic file
(5)
None of these
The
primary purpose of a computer is to process ___ and convert it into
information.
(1)
electricity (2) data
(3)
raw material (4) a bit
(5)None
of these
The
basic input/output system (BIOS) is stored in:
(1)
RAM (2) ROM
(3)TheCPU
(4)The hard
drive
(5)
None of these
|
Qns.
|
Ans.
|
Qns.
|
Ans.
|
Qns.
|
Ans.
|
Qns.
|
Ans.
|
Qns.
|
Ans.
|
1.
|
2
|
11.
|
2
|
21.
|
3
|
31.
|
3
|
41.
|
3
|
2.
|
4
|
12.
|
3
|
22.
|
2
|
32.
|
4
|
42.
|
2
|
3.
|
3
|
13.
|
3
|
23.
|
3
|
33.
|
4
|
43.
|
3
|
4.
|
5
|
14.
|
4
|
24.
|
1
|
34.
|
2
|
44.
|
3
|
5.
|
1
|
15.
|
3
|
25.
|
1
|
35.
|
1
|
45.
|
3
|
6.
|
3
|
16.
|
4
|
26.
|
1
|
36.
|
5
|
46.
|
3
|
7.
|
4
|
17.
|
2
|
27.
|
2
|
37.
|
2
|
47.
|
1
|
8.
|
4
|
18.
|
3
|
28.
|
2
|
38.
|
5
|
48.
|
2
|
9.
|
3
|
19.
|
4
|
29.
|
2
|
39.
|
2
|
49.
|
2
|
10.
|
2
|
20.
|
1
|
30.
|
2
|
40.
|
4
|
50.
|
2
|